Goby/json/Intellian-Aptus-Web-RCE-(CV...

52 lines
1.4 KiB
JSON

{
"Name": "Intellian Aptus Web RCE (CVE-2020-7980)",
"Description": "Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS commands via the Q field within JSON data to the cgi-bin/libagent.cgi URI. NOTE: a valid sid cookie for a login to the intellian default account might be needed.",
"Product": "",
"Homepage": "",
"DisclosureDate": "2020-01-25",
"Author": "itardc@163.com",
"FofaQuery": "title=\"Intellian Aptus\"",
"GobyQuery": "",
"Level": "3",
"Impact": "",
"Recommendation": "",
"References": [
"http://packetstormsecurity.com/files/156143/Satellian-1.12-Remote-Code-Execution.html",
"https://github.com/Xh4H/Satellian-CVE-2020-7980",
"https://sku11army.blogspot.com/2020/01/intellian-aptus-web-rce-intellian.html",
"https://nvd.nist.gov/vuln/detail/CVE-2020-7980",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7980"
],
"HasExp": true,
"ExpParams": [
{
"name": "AttackType",
"type": "select",
"value": "cmd"
},
{
"name": "cmd",
"type": "input",
"value": "whoami",
"show": "AttackType=cmd"
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps":null,
"ExploitSteps": null,
"Tags": ["rce"],
"CVEIDs": [
"CVE-2020-7980"
],
"CVSSScore": "9.8",
"AttackSurfaces": {
"Application": ["Aptus-Web"],
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}