Goby/json/Netsweeper-Webadmin-unixlog...

50 lines
1.7 KiB
JSON

{
"Name": "Netsweeper Webadmin unixlogin.php RCE (CVE-2020-13167)",
"Description": "Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.",
"Product": "netsweeper",
"Homepage": "https://www.netsweeper.com/",
"DisclosureDate": "2021-05-27",
"Author": "李大壮",
"GobyQuery": "title=\"netsweeper\" && body=\"webAdmin\"",
"FofaQuery": "title=\"netsweeper\" && body=\"webAdmin\"",
"Level": "3",
"Impact": "<p><span style=\"color: var(--primaryFont-color);\">Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.</span><br></p>",
"Recommendation": "<p>1.&nbsp;Intercept access to the /webadmin/tools/unixlogin.php directory</p><p>2.&nbsp;Update Patches</p>",
"References": [
"https://ssd-disclosure.com/ssd-advisory-netsweeper-preauth-rce/",
"https://nvd.nist.gov/vuln/detail/CVE-2020-13167",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13167"
],
"HasExp": true,
"ExpParams": [
{
"name": "cmd",
"type": "input",
"value": "whoami"
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": [
"AND"
],
"ExploitSteps": null,
"Tags": [
"RCE"
],
"CVEIDs": [
"CVE-2020-13167"
],
"CVSSScore": "9.8",
"AttackSurfaces": {
"Application": [
"netsweeper"
],
"Support": null,
"Service": null,
"System": null,
"Hardware": null
}
}