.. / CVE-2015-4632

Exploit for Koha 3.20.1 - Directory Traversal (CVE-2015-4632)

Description:

Koha 3.14.x before 3.14.16, 3.16.x before 3.16.12, 3.18.x before 3.18.08, and 3.20.x before 3.20.1 allow remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the template_path parameter to (1) svc/virtualshelves/search or (2) svc/members/search.

Nuclei Template

View the template here CVE-2015-4632.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2015/CVE-2015-4632.yaml
Copy

References:

https://www.sba-research.org/2015/06/24/researchers-of-sba-research-found-several-critical-security-vulnerabilities-in-the-koha-library-software-via-combinatorial-testing/
https://www.exploit-db.com/exploits/37388
https://nvd.nist.gov/vuln/detail/CVE-2015-4632
https://bugs.koha-community.org/bugzilla3/show_bug.cgi?id=14408
https://koha-community.org/koha-3-14-16-released/