Skip to content

OpenBMCS 2.4 - Information Disclosure

ID: openbmcs-secret-disclosure

Severity: high

Author: dhiyaneshDK

Tags: misconfig,edb,openbmcs

OpenBMCS 2.4 contains an information disclosure vulnerability. The application allows directory listing and exposure of some sensitive files, which can allow an attacker to leverage the disclosed information and gain full access.

id: openbmcs-secret-disclosure
info:
name: OpenBMCS 2.4 - Information Disclosure
author: dhiyaneshDK
severity: high
description: OpenBMCS 2.4 contains an information disclosure vulnerability. The application allows directory listing and exposure of some sensitive files, which can allow an attacker to leverage the disclosed information and gain full access.
reference:
- https://www.exploit-db.com/exploits/50671
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-200
metadata:
max-request: 1
shodan-query: http.favicon.hash:1550906681
tags: misconfig,edb,openbmcs
http:
- method: GET
path:
- "{{BaseURL}}/debug/"
matchers-condition: and
matchers:
- type: word
words:
- "change_password_sqls"
- "Index of /debug"
condition: and
- type: status
status:
- 200
# digest: 490a0046304402200242b8f37c9fbc5096bd06817bccd7934d76e6faf2c07e388d7d739812ebf06b02201f89dd584cbddd105432af1857d3e9fcbde1d6f23d226b8fef13f2a0f9554f34:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/openbmcs/openbmcs-secret-disclosure.yaml"

View on Github