nuclei-templates/http/cves/2020/CVE-2020-9047.yaml

66 lines
2.0 KiB
YAML

id: CVE-2020-9047
info:
name: exacqVision Web Service - Remote Code Execution
author: dwisiswant0
severity: high
description: |
exacqVision Web Service is susceptible to remote code execution which could allow the execution of unauthorized code or operating system commands on systems running exacqVision Web Service versions 20.06.3.0 and prior and exacqVision Enterprise Manager versions 20.06.4.0 and prior. An attacker with administrative privileges could potentiallydownload and run a malicious executable that could allow OS command injection on the system.
reference:
- https://github.com/norrismw/CVE-2020-9047
- https://www.johnsoncontrols.com/cyber-solutions/security-advisories
- https://www.us-cert.gov/ics/advisories/ICSA-20-170-01
- https://nvd.nist.gov/vuln/detail/CVE-2020-9047
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cvss-score: 7.2
cve-id: CVE-2020-9047
cwe-id: CWE-347
epss-score: 0.01324
cpe: cpe:2.3:a:johnsoncontrols:exacqvision_enterprise_manager:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: johnsoncontrols
product: exacqvision_enterprise_manager
tags: cve,cve2020,rce,exacqvision
http:
- method: GET
path:
- "{{BaseURL}}/version.web"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "3.10.4.72058"
- "3.12.4.76544"
- "3.8.2.67295"
- "7.0.2.81005"
- "7.2.7.86974"
- "7.4.3.89785"
- "7.6.4.94391"
- "7.8.2.97826"
- "8.0.6.105408"
- "8.2.2.107285"
- "8.4.3.111614"
- "8.6.3.116175"
- "8.8.1.118913"
- "9.0.3.124620"
- "9.2.0.127940"
- "9.4.3.137684"
- "9.6.7.145949"
- "9.8.4.149166"
- "19.03.3.152166"
- "19.06.4.157118"
- "19.09.4.0"
- "19.12.2.0"
- "20.03.2.0"
- "20.06.3.0"
condition: or
- type: status
status:
- 200