diff --git a/http/cves/2023/CVE-2023-50917.yaml b/http/cves/2023/CVE-2023-50917.yaml index a95a6d88d0..64251cbbcc 100644 --- a/http/cves/2023/CVE-2023-50917.yaml +++ b/http/cves/2023/CVE-2023-50917.yaml @@ -4,12 +4,14 @@ info: name: MajorDoMo thumb.php - OS Command Injection author: DhiyaneshDK severity: critical - description: "MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager." + description: | + MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager. reference: - http://packetstormsecurity.com/files/176273/MajorDoMo-Remote-Code-Execution.html - http://seclists.org/fulldisclosure/2023/Dec/19 - https://github.com/sergejey/majordomo/commit/0662e5ebfb133445ff6154b69c61019357092178 - https://github.com/sergejey/majordomo/commit/3ec3ffb863ea3c2661ab27d398776c551f4daaac + - https://nvd.nist.gov/vuln/detail/CVE-2023-50917 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 @@ -19,11 +21,13 @@ info: epss-percentile: 0.41924 cpe: cpe:2.3:a:mjdm:majordomo:*:*:*:*:*:*:*:* metadata: + max-request: 1 + verified: true vendor: mjdm product: majordomo shodan-query: http.favicon.hash:1903390397 fofa-query: app="MajordomoSL" - tags: packetstorm,seclists,cve,cve2023,majordomo,rce + tags: cve,cve2023,majordomo,rce,os http: - method: GET