From d716b347ebd1f3e8cfd8351c4e6e0c6b90ddf6be Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Wed, 2 Nov 2022 20:46:59 +0530 Subject: [PATCH] Update CVE-2021-40661.yaml --- cves/2021/CVE-2021-40661.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-40661.yaml b/cves/2021/CVE-2021-40661.yaml index 16c833a453..1b9bc960b5 100644 --- a/cves/2021/CVE-2021-40661.yaml +++ b/cves/2021/CVE-2021-40661.yaml @@ -8,10 +8,11 @@ info: A remote, unauthenticated, directory traversal vulnerability was identified within the web interface used by IND780 Advanced Weighing Terminals Build 8.0.07 March 19, 2018 (SS Label 'IND780_8.0.07'), Version 7.2.10 June 18, 2012 (SS Label 'IND780_7.2.10'). It was possible to traverse the folders of the affected host by providing a traversal path to the 'webpage' parameter in AutoCE.ini This could allow a remote unauthenticated adversary to access additional files on the affected system. This could also allow the adversary to perform further enumeration against the affected host to identify the versions of the systems in use, in order to launch further attacks in future. reference: - https://sidsecure.au/blog/cve-2021-40661/?_sm_pdc=1&_sm_rid=MRRqb4KBDnjBMJk24b40LMS3SKqPMqb4KVn32Kr - - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40661 + - https://nvd.nist.gov/vuln/detail/CVE-2021-40661 classification: cve-id: CVE-2021-40661 metadata: + verified: true shodan-query: "IND780" google-query: inurl:excalweb.dll tags: cve,cve2021,ind780,lfi