CVE-2015-2996

NUCLEI

SysAid Help Desk Arbitrary File Download

Title source: metasploit

Description

Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum.

Exploits (3)

exploitdb WRITEUP
webappshardware
https://www.exploit-db.com/exploits/43885
metasploit WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/sysaid_file_download.rb
metasploit WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/sysaid_sql_creds.rb

Nuclei Templates (1)

SysAid Help Desk <15.2 - Local File Inclusion
HIGHby 0x_Akoko
Shodan: http.favicon.hash:1540720428
FOFA: icon_hash=1540720428

Scores

EPSS 0.8823
EPSS Percentile 99.5%

Details

CWE
CWE-22
Status published
Products (1)
sysaid/sysaid < 15.1
Published Jun 08, 2015
Tracked Since Feb 18, 2026