nuclei-templates/http/cves/2010/CVE-2010-1870.yaml

54 lines
2.0 KiB
YAML

id: CVE-2010-1870
info:
name: ListSERV Maestro <= 9.0-8 RCE
author: b0yd
severity: medium
description: A struts-based OGNL remote code execution vulnerability exists in ListSERV Maestro before and including version 9.0-8.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
remediation: |
Upgrade to a patched version of ListSERV Maestro that is not affected by this vulnerability.
reference:
- https://www.securifera.com/advisories/sec-2020-0001/
- https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt
- https://www.exploit-db.com/exploits/14360
- http://confluence.atlassian.com/display/FISHEYE/FishEye+Security+Advisory+2010-06-16
- http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html
classification:
cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss-score: 5
cve-id: CVE-2010-1870
cwe-id: CWE-917
epss-score: 0.06174
epss-percentile: 0.92842
cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: apache
product: struts
shodan-query:
- http.html:"apache struts"
- http.title:"struts2 showcase"
- http.html:"struts problem report"
fofa-query:
- body="struts problem report"
- title="struts2 showcase"
- body="apache struts"
google-query: intitle:"struts2 showcase"
tags: cve,cve2010,packetstorm,edb,rce,listserv,ognl,apache
http:
- method: GET
path:
- "{{BaseURL}}/lui/"
- "{{BaseURL}}/hub/"
extractors:
- type: regex
regex:
- 'LISTSERV Maestro\s+9\.0-[123456780]'
- 'LISTSERV Maestro\s+[5678]'
- 'Administration Hub 9\.0-[123456780]'
- 'Administration Hub [5678]'
# digest: 4a0a00473045022100e541bad52cababb6cd2cd61c1b26ab8feaae117ccf9c87d10f7c588ca5d3156202204c61984cd595f1fb51216ffaccaa7ca4e2cca292526bf62b42ccb8aaf95821f0:922c64590222798bb761d5b6d8e72950