The EyesOfNetwork web interface (aka eonweb) 5.1-0 allows local file inclusion via the tool_list parameter (aka the url_tool variable) to module/tool_all/select_tool.php, as demonstrated by a tool_list=php://filter/ substring.
References
Link | Resource |
---|---|
http://www.sstrunk.com/cve/eonweb_module_tool_all_select_tool.html | Exploit Third Party Advisory |
http://www.sstrunk.com/cve/eonweb_module_tool_all_select_tool.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.sstrunk.com/cve/eonweb_module_tool_all_select_tool.html - Exploit, Third Party Advisory |
Information
Published : 2017-09-13 03:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-14404
Mitre link : CVE-2017-14404
CVE.ORG link : CVE-2017-14404
JSON object : View
Products Affected
eyesofnetwork
- eyesofnetwork
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor