nuclei-templates/http/cves/2018/CVE-2018-1207.yaml

45 lines
1.7 KiB
YAML
Raw Normal View History

2021-03-10 07:59:38 +00:00
id: CVE-2018-1207
info:
name: Dell iDRAC7/8 Devices - Remote Code Injection
2021-03-10 07:59:38 +00:00
author: dwisiswant0
severity: critical
description: |
Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain a CGI injection vulnerability
2021-03-10 07:59:38 +00:00
which could be used to execute remote code. A remote unauthenticated attacker may
potentially be able to use CGI variables to execute remote code.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected device.
2023-09-06 12:57:14 +00:00
remediation: |
Apply the latest firmware updates provided by Dell to mitigate this vulnerability.
reference:
- https://downloads.dell.com/solutions/dell-management-solution-resources/iDRAC_CVE%201207_1211_1000116.pdf
- https://github.com/KraudSecurity/Exploits/blob/master/CVE-2018-1207/CVE-2018-1207.py
- https://nvd.nist.gov/vuln/detail/CVE-2018-1207
- http://en.community.dell.com/techcenter/extras/m/white_papers/20485410
2023-07-15 16:29:17 +00:00
- https://twitter.com/nicowaisman/status/977279766792466432
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-1207
cwe-id: CWE-94
2023-10-14 11:27:55 +00:00
epss-score: 0.01875
epss-percentile: 0.87126
2023-09-06 12:57:14 +00:00
cpe: cpe:2.3:a:dell:emc_idrac7:*:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: dell
product: emc_idrac7
2024-01-14 09:21:50 +00:00
tags: cve2018,cve,dell,injection,rce
2021-03-10 07:59:38 +00:00
http:
2021-03-10 07:59:38 +00:00
- method: GET
path:
- "{{BaseURL}}/cgi-bin/login?LD_DEBUG=files"
2023-07-11 19:49:27 +00:00
2021-03-10 07:59:38 +00:00
matchers:
- type: word
2023-07-11 19:49:27 +00:00
part: response
2021-03-10 07:59:38 +00:00
words:
- "calling init: /lib/"
# digest: 4a0a00473045022100f746db495c14714583f0d7e41abc078c683798be8c32c7f10f1e077a576c687102206c8915353d8b0c5fc193bf8282e19e2d82aea80f4d83df8df6161b1d3b1733d7:922c64590222798bb761d5b6d8e72950