Goby/json/Kyan-Network-monitoring-Pas...

47 lines
1.3 KiB
JSON

{
"Name": "Kyan Network monitoring Password Leakage And run.php RCE",
"Description": "Kyan network monitoring device run.php can execute arbitrary commands in the case of identity authentication. With the account and password leakage vulnerability, it can obtain server permissions, and there is a remote command execution vulnerability",
"Product": "Kyan Network monitoring",
"Homepage": "http://www.kyanmedia.com",
"DisclosureDate": "2021-06-05",
"Author": "PeiQi",
"GobyQuery": "app=\"Kyan-Design\"",
"Level": "3",
"Impact": "<p>it can obtain server permissions, and there is a remote command execution vulnerability</p>",
"Recommendation": "Filter parameters",
"References": [
"https://fofa.so"
],
"HasExp": true,
"ExpParams": [
{
"name": "Cmd",
"type": "input",
"value": "id"
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND"
],
"ExploitSteps": null,
"Tags": [
"RCE"
],
"CVEIDs": null,
"CVSSScore": "0.0",
"AttackSurfaces": {
"Application": [
"Kyan Network monitoring"
],
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"Disable": false,
"Recommendation": "<p>Strictly filter the data input by users and prohibit the execution of unexpected system commands</p>"
}