Skip to content

Instantly share code, notes, and snippets.

@s4fv4n
Created January 16, 2025 10:48
Show Gist options
  • Save s4fv4n/56c326450dcb3ab808b5ce8242a11e30 to your computer and use it in GitHub Desktop.
Save s4fv4n/56c326450dcb3ab808b5ce8242a11e30 to your computer and use it in GitHub Desktop.
CVE ID: CVE-2024-57785
Vulnerability Title: Authenticated Local File Inclusion Vulnerability on Zenitel AlphaWeb XE v11.2.3.10
Description:
Zenitel AlphaWeb XE v11.2.3.10 was discovered to contain a local file inclusion vulnerability via the component amc_uploads.php.
VulnerabilityType Other:
Local File Inclusion Vulnerability
Vendor of Product:
Zenitel
Affected Product Code Base:
Zenitel AlphaWeb XE - Version 11.2.3.10
Affected Component:
Affected URL: http://<ip address>/php/amc_uploads.php?action=readlog&file=/etc/passwd
Attack Type:
Remote
Impact Information Disclosure:
true
Attack Vectors:
Steps to Reproduce:
Step 1: Authenticate to the Zenitel AlphaWeb XE web application Version 11.2.3.10. (can use the default username 'admin' and password 'alphaadmin' for authentication).
Step2 : After login to the Zenitel AlphaWeb XE web application, navigate to the URL "http://<ip address>/php/amc_uploads.php?action=readlog&file=/etc/passwd" and we will be able to successfully access the /etc/passwd file.
Step 3: We can even access the /etc/shadow file which contains the local user password hashes by using the URL "http://<ip address>/php/amc_uploads.php?action=readlog&file=/etc/shadow".
Step 4: Then we can try to crack these passwords to access the linux system.
Reference:
https://www.zenitel.com/
Discoverer:
Safvan Parakkal from MoroHub
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment