diff --git a/http/cves/2023/CVE-2023-45855.yaml b/http/cves/2023/CVE-2023-45855.yaml new file mode 100644 index 00000000000..db33f12afc7 --- /dev/null +++ b/http/cves/2023/CVE-2023-45855.yaml @@ -0,0 +1,46 @@ +id: CVE-2023-45855 + +info: + name: qdPM 9.2 - Directory Traversal + author: DhiyaneshDk + severity: high + description: | + qdPM 9.2 allows Directory Traversal to list files and directories by navigating to the /uploads URI. + impact: | + Successful exploitation could allow an attacker to read sensitive files on the server. + remediation: | + Upgrade qdPM to a non-vulnerable version to mitigate the directory traversal vulnerability. + reference: + - https://github.com/SunshineOtaku/Report-CVE/blob/main/qdPM/9.2/Directory%20Traversal.md + - https://nvd.nist.gov/vuln/detail/CVE-2023-45855 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2023-45855 + cwe-id: CWE-22 + epss-score: 0.00087 + epss-percentile: 0.35946 + cpe: cpe:2.3:a:qdpm:qdpm:9.2:*:*:*:*:*:*:* + metadata: + vendor: qdpm + product: qdpm + shodan-query: http.favicon.hash:762074255 + tags: cve,cve2023,qdpm,lfi + +http: + - method: GET + path: + - "{{BaseURL}}/uploads/" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "Index of /uploads" + - "attachments/" + condition: and + + - type: status + status: + - 200