From 7cf405ef77d0feb8bf4bf9b556440aee4083e4a1 Mon Sep 17 00:00:00 2001 From: Kazgangap Date: Wed, 24 Jul 2024 02:18:42 +0300 Subject: [PATCH 1/2] add CVE-2024-39250 --- http/cves/2024/CVE-2024-39250.yaml | 50 ++++++++++++++++++++++++++++++ 1 file changed, 50 insertions(+) create mode 100644 http/cves/2024/CVE-2024-39250.yaml diff --git a/http/cves/2024/CVE-2024-39250.yaml b/http/cves/2024/CVE-2024-39250.yaml new file mode 100644 index 0000000000..beb9189b88 --- /dev/null +++ b/http/cves/2024/CVE-2024-39250.yaml @@ -0,0 +1,50 @@ +id: CVE-2024-39250 + +info: + name: EfroTech Timetrax v8.3 - Sql Injection + author: securityforeveryone,efran + severity: high + description: | + EfroTech Timetrax v8.3 was discovered to contain an unauthenticated SQL injection vulnerability via the q parameter in the search web interface. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2024-39250 + - https://www.tenable.com/cve/CVE-2024-39250 + - https://github.com/efrann/CVE-2024-39250 + - https://vuldb.com/?id.272268 + classification: + epss-score: 0.00043 + epss-percentile: 0.09359 + metadata: + vendor: EfroTech + product: Timetrax + fofa-query: icon_hash="-661694518" + tags: cve,cve2024,sqli,timetrax +flow: http(1) && http(2) + +http: + - raw: + - | + GET /Login.aspx HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - 'contains(body,"TimeTrax - Cloud HR Software")' + - 'contains(content_type, "text/html")' + - 'status_code == 200' + condition: and + internal: true + + - raw: + - | + GET /search.aspx?q=' HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - 'contains_all(body,"Incorrect syntax near","Unclosed quotation mark after the character string")' + - 'contains(content_type, "text/html")' + - 'status_code == 500' + condition: and From 558f41333fe78f74907ab291cd6f6a6eea8d2671 Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Wed, 24 Jul 2024 14:54:25 +0530 Subject: [PATCH 2/2] minor-update --- http/cves/2024/CVE-2024-39250.yaml | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/http/cves/2024/CVE-2024-39250.yaml b/http/cves/2024/CVE-2024-39250.yaml index beb9189b88..5df77304a2 100644 --- a/http/cves/2024/CVE-2024-39250.yaml +++ b/http/cves/2024/CVE-2024-39250.yaml @@ -15,10 +15,11 @@ info: epss-score: 0.00043 epss-percentile: 0.09359 metadata: - vendor: EfroTech - product: Timetrax + vendor: efroTech + product: timetrax fofa-query: icon_hash="-661694518" tags: cve,cve2024,sqli,timetrax + flow: http(1) && http(2) http: