ListSERV Maestro <= 9.0-8 RCE
ID: CVE-2010-1870
Severity: medium
Author: b0yd
Tags: cve,cve2010,packetstorm,edb,rce,listserv,ognl,apache
Description
Section titled “Description”A struts-based OGNL remote code execution vulnerability exists in ListSERV Maestro before and including version 9.0-8.
YAML Source
Section titled “YAML Source”id: CVE-2010-1870
info: name: ListSERV Maestro <= 9.0-8 RCE author: b0yd severity: medium description: A struts-based OGNL remote code execution vulnerability exists in ListSERV Maestro before and including version 9.0-8. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: | Upgrade to a patched version of ListSERV Maestro that is not affected by this vulnerability. reference: - https://www.securifera.com/advisories/sec-2020-0001/ - https://packetstormsecurity.com/files/159643/listservmaestro-exec.txt - https://www.exploit-db.com/exploits/14360 - http://confluence.atlassian.com/display/FISHEYE/FishEye+Security+Advisory+2010-06-16 - http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html classification: cvss-metrics: CVSS:2.0/AV:N/AC:L/Au:N/C:N/I:P/A:N cvss-score: 5 cve-id: CVE-2010-1870 cwe-id: CWE-917 epss-score: 0.06174 epss-percentile: 0.92842 cpe: cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:* metadata: max-request: 2 vendor: apache product: struts shodan-query: - http.html:"apache struts" - http.title:"struts2 showcase" - http.html:"struts problem report" fofa-query: - body="struts problem report" - title="struts2 showcase" - body="apache struts" google-query: intitle:"struts2 showcase" tags: cve,cve2010,packetstorm,edb,rce,listserv,ognl,apache
http: - method: GET path: - "{{BaseURL}}/lui/" - "{{BaseURL}}/hub/"
extractors: - type: regex regex: - 'LISTSERV Maestro\s+9\.0-[123456780]' - 'LISTSERV Maestro\s+[5678]' - 'Administration Hub 9\.0-[123456780]' - 'Administration Hub [5678]'# digest: 4b0a00483046022100810c7e966e77a427ed0fb87704506537a708944fc4ed507c10a79f2a6fbbaa10022100e11b54ac53c8cfa46fa1796b1176c83aa63b435ab6601f1306683ab86a487c0d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2010/CVE-2010-1870.yaml"