Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-45855
HistoryMay 13, 2024 - 12:02 p.m.

qdPM 9.2 - Directory Traversal

2024-05-1312:02:41
ProjectDiscovery
github.com
9
qdpm
directory traversal
sensitive files
server
upgrade
non-vulnerable version
cve-2023-45855
cwe-22

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.003 Low

EPSS

Percentile

70.6%

qdPM 9.2 allows Directory Traversal to list files and directories by navigating to the /uploads URI.
id: CVE-2023-45855

info:
  name: qdPM 9.2 - Directory Traversal
  author: DhiyaneshDk
  severity: high
  description: |
    qdPM 9.2 allows Directory Traversal to list files and directories by navigating to the /uploads URI.
  impact: |
    Successful exploitation could allow an attacker to read sensitive files on the server.
  remediation: |
    Upgrade qdPM to a non-vulnerable version to mitigate the directory traversal vulnerability.
  reference:
    - https://github.com/SunshineOtaku/Report-CVE/blob/main/qdPM/9.2/Directory%20Traversal.md
    - https://nvd.nist.gov/vuln/detail/CVE-2023-45855
    - https://qdpm.net
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-45855
    cwe-id: CWE-22
    epss-score: 0.00318
    epss-percentile: 0.70433
    cpe: cpe:2.3:a:qdpm:qdpm:9.2:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: qdpm
    product: qdpm
    shodan-query: "http.favicon.hash:762074255"
    fofa-query: "icon_hash=762074255"
  tags: cve,cve2023,qdpm,lfi

http:
  - method: GET
    path:
      - "{{BaseURL}}/uploads/"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "Index of /uploads</title>"
          - "attachments/</a>"
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100e56df1cdf4a2f95836eef15fe7159b16232539b6130847915ca391722b2fda6a022100883868300f7d168a5617d481ba299432509133ebbdc32149a7ead90350e95cb3:922c64590222798bb761d5b6d8e72950

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

0.003 Low

EPSS

Percentile

70.6%

Related for NUCLEI:CVE-2023-45855