2022-05-06 15:29:15 +00:00
id : ruijie-password-leak
2022-05-06 10:40:24 +00:00
info :
2023-02-14 14:16:56 +00:00
name : RG-UAC Ruijie - Password Hashes Leak
author : ritikchaddha,galoget
2022-05-06 10:40:24 +00:00
severity : high
2023-02-14 14:16:56 +00:00
description : |
Multiple Firewall Devices from vendor Ruijie Networks are affected by an information leakage vulnerability where credentials are included in the source code of the web admin login interface (usernames, roles, MD5 hashes and additional details of each user). Attackers can use this information to illegally access into the vulnerable devices, obtain sensitive device information and change configurations. The vulnerability is identified by CNVD-2021-14536.
2022-05-06 10:40:24 +00:00
reference :
- https://forum.butian.net/share/177
2023-02-14 14:16:56 +00:00
- https://www.ruijie.com.cn/gy/xw-aqtg-zw/86924/
- https://www.cnvd.org.cn/flaw/show/CNVD-2021-14536
2022-05-06 15:29:15 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 1
2023-02-14 14:16:56 +00:00
verified : true
2022-05-06 15:29:15 +00:00
shodan-query : http.html:"Get_Verify_Info"
tags : password,leak,ruijie,exposure,firewall,router
2022-05-06 10:40:24 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-05-06 10:40:24 +00:00
- method : GET
path :
2022-05-06 15:29:15 +00:00
- "{{BaseURL}}"
2022-05-06 10:40:24 +00:00
matchers-condition : and
matchers :
2023-02-14 14:16:56 +00:00
- type : dsl
dsl :
- 'contains(tolower(body), ' '\"role\":\"super_admin\"' ')'
- 'contains(tolower(body), ' '\"role\":\"guest_admin\"' ')'
- 'contains(tolower(body), ' '\"role\":\"reporter_admin\"' ')'
condition : or
2022-05-06 15:29:15 +00:00
- type : status
status :
- 200
extractors :
- type : regex
2022-05-06 10:40:24 +00:00
part : body
2022-05-06 15:29:15 +00:00
regex :
2023-02-14 14:16:56 +00:00
- '"password":"[a-f0-9]{32}'