Update CVE-2022-35405.yaml

patch-1
Ritik Chaddha 2022-09-04 12:25:42 +05:30 committed by GitHub
parent 384b6e352e
commit 5257a9786c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 11 additions and 6 deletions

View File

@ -1,7 +1,7 @@
id: CVE-2022-35405 id: CVE-2022-35405
info: info:
name: Zoho ManageEngine Password Manager Pro - unauthenticated Remote Command Execution name: Zoho ManageEngine Password Manager Pro - Remote Command Execution(Unauthenticated)
author: true13 author: true13
severity: critical severity: critical
description: | description: |
@ -10,19 +10,18 @@ info:
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/zoho_password_manager_pro_xml_rpc_rce.rb - https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/zoho_password_manager_pro_xml_rpc_rce.rb
- https://nvd.nist.gov/vuln/detail/CVE-2022-35405 - https://nvd.nist.gov/vuln/detail/CVE-2022-35405
classification: classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-35405 cve-id: CVE-2022-35405
tags: cve,cve2022,rce,Zoho,ManageEngine,Passwordmanager,unauthenticated metadata:
shodan-query: http.title:"ManageEngine Password"
tags: cve,cve2022,rce,zoho,passwordmanager,unauth
requests: requests:
- raw: - raw:
- | - |
POST /xmlrpc HTTP/1.1 POST /xmlrpc HTTP/1.1
Host: {{Hostname}} Host: {{Hostname}}
Accept: */*
Accept-Language: en
Content-Type: text/xml Content-Type: text/xml
<?xml version="1.0"?> <?xml version="1.0"?>
<methodCall> <methodCall>
<methodName>ProjectDiscovery</methodName> <methodName>ProjectDiscovery</methodName>
@ -42,8 +41,14 @@ requests:
</params> </params>
</methodCall> </methodCall>
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: body part: body
words: words:
- "Failed to read result object: null" - "Failed to read result object: null"
- type: word
part: header
words:
- text/xml