From 907ab2ecda577affc3d10ddb9a988e08bb8f00f8 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Thu, 9 Jun 2022 13:20:21 -0400 Subject: [PATCH] Enhancement: cves/2017/CVE-2017-15363.yaml by mp --- cves/2017/CVE-2017-15363.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2017/CVE-2017-15363.yaml b/cves/2017/CVE-2017-15363.yaml index d3ef8ff490..61e9d12ce6 100644 --- a/cves/2017/CVE-2017-15363.yaml +++ b/cves/2017/CVE-2017-15363.yaml @@ -4,7 +4,7 @@ info: name: Luracast Restler 3.0.1 via TYPO3 Restler 1.7.1 - Local File Inclusion author: 0x_Akoko severity: high - description: Luracast Restler 3.0.1 via TYPO3 Restler 1.7.1 is susceptible to local file inclusion in public/examples/resources/getsource.php. This could allow remote attackers to read arbitrary files via the file parameter.1 + description: Luracast Restler 3.0.1 via TYPO3 Restler 1.7.1 is susceptible to local file inclusion in public/examples/resources/getsource.php. This could allow remote attackers to read arbitrary files via the file parameter. reference: - https://www.exploit-db.com/exploits/42985 - https://www.cvedetails.com/cve/CVE-2017-15363