nuclei-templates/http/cves/2010/CVE-2010-1870.yaml

45 lines
1.7 KiB
YAML

id: CVE-2010-1870
info:
name: ListSERV Maestro <= 9.0-8 RCE
author: b0yd
severity: medium
description: A struts-based OGNL remote code execution vulnerability exists in ListSERV Maestro before and including version 9.0-8.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
remediation: |
Upgrade to a patched version of ListSERV Maestro that is not affected by this vulnerability.
reference:
- https://www.securifera.com/advisories/sec-2020-0001/
- https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt
- https://www.exploit-db.com/exploits/14360
- http://confluence.atlassian.com/display/FISHEYE/FishEye+Security+Advisory+2010-06-16
- http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss-score: 5
cve-id: CVE-2010-1870
cwe-id: CWE-917
epss-score: 0.06174
epss-percentile: 0.92842
cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: apache
product: struts
tags: packetstorm,edb,cve,cve2010,rce,listserv,ognl,apache
http:
- method: GET
path:
- "{{BaseURL}}/lui/"
- "{{BaseURL}}/hub/"
extractors:
- type: regex
regex:
- 'LISTSERV Maestro\s+9\.0-[123456780]'
- 'LISTSERV Maestro\s+[5678]'
- 'Administration Hub 9\.0-[123456780]'
- 'Administration Hub [5678]'
# digest: 490a0046304402206c476becb6734d99f6798012e82683e6f1881820d70f3f73860b57005d3dd0360220405a12d4a3f8492ce1daa1e583f1610f44c69a6747d4d6a11f03a6fee8e5d50b:922c64590222798bb761d5b6d8e72950