diff --git a/cves/2022/CVE-2022-1040.yaml b/cves/2022/CVE-2022-1040.yaml new file mode 100644 index 0000000000..ee1749ae17 --- /dev/null +++ b/cves/2022/CVE-2022-1040.yaml @@ -0,0 +1,40 @@ +id: CVE-2022-1040 + +info: + name: Sophos Firewall RCE + author: For3stCo1d + severity: critical + description: An authentication bypass vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v18.5 MR3 and older. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2022-1040 + - https://github.com/killvxk/CVE-2022-1040 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 9.8 + cve-id: CVE-2022-1040 + cwe-id: CWE-287 + tags: cve,cve2022,sophos,firewall + +requests: + - method: POST + path: + - "{{BaseURL}}/userportal/Controller?mode=8700&operation=1&datagrid=179&json={\"🦞\":\"test\"}" + headers: + X-Requested-With: "XMLHttpRequest" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "{\"status\":400}" + + - type: word + part: header + words: + - "Server: xxxx" + + - type: status + status: + - 200 +