Flatpress < 1.3 - Path Traversal
ID: CVE-2023-0947
Severity: critical
Author: r3Y3r53
Tags: cve,cve2023,huntr,lfi,flatpress,listing
Description
Section titled “Description”Path Traversal in GitHub repository flatpressblog/flatpress prior to 1.3.
YAML Source
Section titled “YAML Source”id: CVE-2023-0947
info: name: Flatpress < 1.3 - Path Traversal author: r3Y3r53 severity: critical description: | Path Traversal in GitHub repository flatpressblog/flatpress prior to 1.3. reference: - https://huntr.dev/bounties/7379d702-72ff-4a5d-bc68-007290015496/ - https://nvd.nist.gov/vuln/detail/CVE-2023-0947 - https://github.com/flatpressblog/flatpress/commit/9c4e5d6567e446c472f3adae3b2fe612f66871c7 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-0947 cwe-id: CWE-22 epss-score: 0.01537 epss-percentile: 0.87078 cpe: cpe:2.3:a:flatpress:flatpress:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: flatpress product: flatpress shodan-query: - http.favicon.hash:-1189292869 - http.html:"flatpress" fofa-query: - body="flatpress" - icon_hash=-1189292869 tags: cve,cve2023,huntr,lfi,flatpress,listing
http: - method: GET path: - "{{BaseURL}}/fp-content/" - "{{BaseURL}}/flatpress/fp-content/"
stop-at-first-match: true matchers: - type: dsl dsl: - 'status_code == 200' - 'contains(body, "<title>Index of /fp-content</title>")' condition: and# digest: 4a0a00473045022100810b27465d0bfebc0508a53e51229fd9bf1a4c3625dcabfb51a758b243854cec02201adca3836d565801a163352648d71cc1942d254f4a9da4c6158c75fd87d3207d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-0947.yaml"