Update CVE-2022-35405.yaml

patch-1
Ritik Chaddha 2022-09-04 12:25:42 +05:30 committed by GitHub
parent 384b6e352e
commit 5257a9786c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 11 additions and 6 deletions

View File

@ -1,7 +1,7 @@
id: CVE-2022-35405
info:
name: Zoho ManageEngine Password Manager Pro - unauthenticated Remote Command Execution
name: Zoho ManageEngine Password Manager Pro - Remote Command Execution(Unauthenticated)
author: true13
severity: critical
description: |
@ -10,19 +10,18 @@ info:
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/zoho_password_manager_pro_xml_rpc_rce.rb
- https://nvd.nist.gov/vuln/detail/CVE-2022-35405
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-35405
tags: cve,cve2022,rce,Zoho,ManageEngine,Passwordmanager,unauthenticated
metadata:
shodan-query: http.title:"ManageEngine Password"
tags: cve,cve2022,rce,zoho,passwordmanager,unauth
requests:
- raw:
- |
POST /xmlrpc HTTP/1.1
Host: {{Hostname}}
Accept: */*
Accept-Language: en
Content-Type: text/xml
<?xml version="1.0"?>
<methodCall>
<methodName>ProjectDiscovery</methodName>
@ -42,8 +41,14 @@ requests:
</params>
</methodCall>
matchers-condition: and
matchers:
- type: word
part: body
words:
- "Failed to read result object: null"
- type: word
part: header
words:
- text/xml