cve/2022/CVE-2022-29464.md

121 lines
5.8 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-29464](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29464)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Certain WSO2 products allow unrestricted file upload with resultant remote code execution. The attacker must use a /fileupload endpoint with a Content-Disposition directory traversal sequence to reach a directory under the web root, such as a ../../../../repository/deployment/server/webapps directory. This affects WSO2 API Manager 2.2.0 up to 4.0.0, WSO2 Identity Server 5.2.0 up to 5.11.0, WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0 and 5.6.0, WSO2 Identity Server as Key Manager 5.3.0 up to 5.11.0, WSO2 Enterprise Integrator 6.2.0 up to 6.6.0, WSO2 Open Banking AM 1.4.0 up to 2.0.0 and WSO2 Open Banking KM 1.4.0, up to 2.0.0.
### POC
#### Reference
- http://packetstormsecurity.com/files/166921/WSO-Arbitrary-File-Upload-Remote-Code-Execution.html
- http://www.openwall.com/lists/oss-security/2022/04/22/7
- https://github.com/hakivvi/CVE-2022-29464
#### Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0xAgun/CVE-2022-29464
2024-06-22 09:37:59 +00:00
- https://github.com/0xMarcio/cve
2024-05-25 21:48:12 +02:00
- https://github.com/20142995/Goby
- https://github.com/20142995/pocsuite3
- https://github.com/2lambda123/panopticon-unattributed
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/ArrestX/--POC
- https://github.com/Awrrays/FrameVul
- https://github.com/Blackyguy/-CVE-2022-29464
- https://github.com/Bryan988/shodan-wso2
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/Chocapikk/CVE-2022-29464
- https://github.com/GhostTroops/TOP
- https://github.com/H3xL00m/CVE-2022-29464
- https://github.com/Hatcat123/my_stars
- https://github.com/HimmelAward/Goby_POC
- https://github.com/Inplex-sys/CVE-2022-29464-loader
- https://github.com/JERRY123S/all-poc
- https://github.com/Jhonsonwannaa/CVE-2022-29464-
- https://github.com/KatherineHuangg/metasploit-POC
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Lidong-io/cve-2022-29464
- https://github.com/LinJacck/CVE-2022-29464
- https://github.com/Loginsoft-LLC/Linux-Exploit-Detection
- https://github.com/Loginsoft-Research/Linux-Exploit-Detection
- https://github.com/Miraitowa70/POC-Notes
2024-08-31 19:52:39 +00:00
- https://github.com/N3rdyN3xus/CVE-2022-29464
2024-05-25 21:48:12 +02:00
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Panopticon-Project/panopticon-unattributed
- https://github.com/Pari-Malam/CVE-2022-29464
- https://github.com/Pasch0/WSO2RCE
- https://github.com/Pushkarup/CVE-2022-29464
- https://github.com/PyterSmithDarkGhost/EXPLOITCVE-2022-29464
- https://github.com/SYRTI/POC_to_review
- https://github.com/SnailDev/github-hot-hub
- https://github.com/Str1am/my-nuclei-templates
- https://github.com/SynixCyberCrimeMy/CVE-2022-29464
- https://github.com/ThatNotEasy/CVE-2022-29464
- https://github.com/Threekiii/Awesome-POC
- https://github.com/UUFR/CVE-2022-29464
- https://github.com/W01fh4cker/Serein
- https://github.com/WhooAmii/POC_to_review
- https://github.com/Z0fhack/Goby_POC
- https://github.com/adriyansyah-mf/mass-auto-exploit-wso2
- https://github.com/amit-pathak009/CVE-2022-29464
- https://github.com/amit-pathak009/CVE-2022-29464-mass
- https://github.com/anquanscan/sec-tools
- https://github.com/awsassets/WSO2RCE
- https://github.com/axin2019/CVE-2022-29464
- https://github.com/badguy233/CVE-2022-29465
- https://github.com/c0d3cr4f73r/CVE-2022-29464
- https://github.com/cipher387/awesome-ip-search-engines
- https://github.com/crypticdante/CVE-2022-29464
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/devengpk/CVE-2022-29464
- https://github.com/dravenww/curated-article
- https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464
- https://github.com/electr0lulz/electr0lulz
- https://github.com/fardeen-ahmed/Bug-bounty-Writeups
- https://github.com/gbrsh/CVE-2022-29464
- https://github.com/gpiechnik2/nmap-CVE-2022-29464
- https://github.com/h3v0x/CVE-2022-29464
2024-06-22 09:37:59 +00:00
- https://github.com/hakivvi/CVE-2022-29464
2024-05-25 21:48:12 +02:00
- https://github.com/hev0x/CVE-2022-29464
- https://github.com/hktalent/TOP
- https://github.com/hupe1980/CVE-2022-29464
- https://github.com/jbmihoub/all-poc
- https://github.com/jimidk/Better-CVE-2022-29464
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/k4u5h41/CVE-2022-29464
- https://github.com/lonnyzhang423/github-hot-hub
- https://github.com/lowkey0808/cve-2022-29464
- https://github.com/manas3c/CVE-POC
2024-08-15 18:54:34 +00:00
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
2024-05-25 21:48:12 +02:00
- https://github.com/mr-r3bot/WSO2-CVE-2022-29464
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oppsec/WSOB
2024-06-07 04:52:01 +00:00
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
2024-05-25 21:48:12 +02:00
- https://github.com/r4x0r1337/-CVE-2022-29464
- https://github.com/rootxyash/learn365days
- https://github.com/superlink996/chunqiuyunjingbachang
- https://github.com/superzerosec/CVE-2022-29464
- https://github.com/superzerosec/poc-exploit-index
- https://github.com/tanjiti/sec_profile
- https://github.com/trganda/starrlist
- https://github.com/trhacknon/CVE-2022-29464
- https://github.com/trhacknon/CVE-2022-29464-mass
- https://github.com/trhacknon/Pocingit
- https://github.com/tufanturhan/wso2-rce-cve-2022-29464
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoforget/CVE-POC
- https://github.com/xiaoy-sec/Pentest_Note
- https://github.com/xinghonghaoyue/CVE-2022-29464
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve