nuclei-templates/http/cves/2018/CVE-2018-1207.yaml

45 lines
1.7 KiB
YAML
Raw Normal View History

2021-03-10 07:59:38 +00:00
id: CVE-2018-1207
info:
name: Dell iDRAC7/8 Devices - Remote Code Injection
2021-03-10 07:59:38 +00:00
author: dwisiswant0
severity: critical
description: |
Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain a CGI injection vulnerability
2021-03-10 07:59:38 +00:00
which could be used to execute remote code. A remote unauthenticated attacker may
potentially be able to use CGI variables to execute remote code.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected device.
2023-09-06 12:57:14 +00:00
remediation: |
Apply the latest firmware updates provided by Dell to mitigate this vulnerability.
reference:
- https://downloads.dell.com/solutions/dell-management-solution-resources/iDRAC_CVE%201207_1211_1000116.pdf
- https://github.com/KraudSecurity/Exploits/blob/master/CVE-2018-1207/CVE-2018-1207.py
- https://nvd.nist.gov/vuln/detail/CVE-2018-1207
- http://en.community.dell.com/techcenter/extras/m/white_papers/20485410
2023-07-15 16:29:17 +00:00
- https://twitter.com/nicowaisman/status/977279766792466432
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-1207
cwe-id: CWE-94
2023-10-14 11:27:55 +00:00
epss-score: 0.01875
epss-percentile: 0.88144
2023-09-06 12:57:14 +00:00
cpe: cpe:2.3:a:dell:emc_idrac7:*:*:*:*:*:*:*:*
metadata:
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: dell
product: emc_idrac7
2024-01-14 09:21:50 +00:00
tags: cve2018,cve,dell,injection,rce
2021-03-10 07:59:38 +00:00
http:
2021-03-10 07:59:38 +00:00
- method: GET
path:
- "{{BaseURL}}/cgi-bin/login?LD_DEBUG=files"
2023-07-11 19:49:27 +00:00
2021-03-10 07:59:38 +00:00
matchers:
- type: word
2023-07-11 19:49:27 +00:00
part: response
2021-03-10 07:59:38 +00:00
words:
- "calling init: /lib/"
# digest: 4a0a00473045022100aecfe41ed529d979eb0d5e85bcb47766d58e166f2a3001bdd425be15bae9f33302204dbc7bef9234de5be6f16d334ac21107b1381db5dd0d893a75aeaf8a596b5b77:922c64590222798bb761d5b6d8e72950