Delete ruijie-password-hashes-leak.yaml

patch-1
Ritik Chaddha 2023-02-14 19:47:22 +05:30 committed by GitHub
parent fa5f1f5d8d
commit 749480c23c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 0 additions and 41 deletions

View File

@ -1,41 +0,0 @@
id: ruijie-password-hashes-leak
info:
name: RG-UAC Ruijie Password Hashes Leak
author: galoget
severity: high
description: Multiple Firewall Devices from vendor Ruijie Networks are affected by an information leakage vulnerability where credentials are included in the source code of the web admin login interface (usernames, roles, MD5 hashes and additional details of each user). Attackers can use this information to illegally access into the vulnerable devices, obtain sensitive device information and change configurations. The vulnerability is identified by CNVD-2021-14536.
reference:
- https://www.ruijie.com.cn/gy/xw-aqtg-zw/86924/
- https://forum.butian.net/share/177
- https://www.cnvd.org.cn/flaw/show/CNVD-2021-14536
metadata:
shodan-query: http.html:"Get_Verify_Info"
verified: True
tags: password,leak,hash,md5,ruijie,exposure,firewall,router
requests:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: dsl
dsl:
- 'contains(tolower(body), ''\"role\":\"super_admin\"'')'
- 'contains(tolower(body), ''\"role\":\"guest_admin\"'')'
- 'contains(tolower(body), ''\"role\":\"reporter_admin\"'')'
condition: or
- type: status
status:
- 200
extractors:
- type: regex
part: body
regex:
- '"password":"[a-f0-9]{32}'