.. / CVE-2020-24571

Exploit for NexusDB <4.50.23 - Local File Inclusion (CVE-2020-24571)

Description:

NexusQA NexusDB before 4.50.23 allows the reading of files via ../ directory traversal and local file inclusion.

Nuclei Template

View the template here CVE-2020-24571.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-24571.yaml
Copy

References:

https://github.com/StarCrossPortal/scalpel
https://github.com/ARPSyndicate/kenzer-templates
https://nvd.nist.gov/vuln/detail/CVE-2020-24571
https://github.com/HimmelAward/Goby_POC
https://www.nexusdb.com/mantis/bug_view_advanced_page.php?bug_id=2371