nuclei-templates icon indicating copy to clipboard operation
nuclei-templates copied to clipboard

Nuclei doesn't find CVE-2020-7247 (OOB vulnerability)

Open pentesttools-com opened this issue 4 months ago • 2 comments

Nuclei Version:

3.1.10

Template file:

network/cves/2020/CVE-2020-7247.yaml

Command to reproduce:

nuclei -t CVE-2020-7247.yaml -u 70.34.253.177:8825

The target is deliberately vulnerable, so the vulnerability should be found by nuclei. By debugging we observed that the command gets executed on the victim machine, the interactsh server receives the request from the victim and the attacker machine communicates with the interactsh server too. The problem might be in the way that nuclei checks for the interaction.

pentesttools-com avatar Feb 15 '24 15:02 pentesttools-com

Thanks for the details on this @pentesttools-com and for including a host! Looks to me like the host isn't live but we'll take a look

olearycrew avatar Feb 16 '24 14:02 olearycrew

It's up for me it seems. I don't know what caused the downtime.

If we can help you further with any logs or details feel free to ask!

image

pentesttools-com avatar Feb 17 '24 07:02 pentesttools-com

Hi @pentesttools-com, The response time to this issue was much longer than usual. Thank you for taking the time to create this issue and for contributing to this project 🍻

We are working on a JavaScript template for this, but it looks like there is an issue. We will update the template shortly.

princechaddha avatar Feb 28 '24 07:02 princechaddha

@pentesttools-com It seems that the deliberately vulnerable system is not vulnerable, or the target does not have nslookup installed in the environment. Even the Python exploit does not appear to be working http://packetstormsecurity.com/files/156145/OpenSMTPD-6.6.2-Remote-Code-Execution.html.

Can you try running python script with 'touch /tmp/1' and validate it locally?

princechaddha avatar Feb 28 '24 08:02 princechaddha

Hi, @princechaddha! No worries.

Yes, the system doesn't have nslookup installed. You can try modifying the template to use wget. I've validated that the exploit works with touch and even with wget that the command executes and leaves artefacts on the system. (log files, and the response from interactsh)

pentesttools-com avatar Feb 28 '24 14:02 pentesttools-com

@pentesttools-com

why you use ? -sS

github QTranspose/CVE-2020-7247-exploit

sec13b avatar Mar 23 '24 14:03 sec13b

@pentesttools-com It is fixed in this PR. I have rewrite this template in the JavaScript protocol.

princechaddha avatar Mar 27 '24 06:03 princechaddha