nuclei-templates/http/cves/2024/CVE-2024-46310.yaml

32 lines
1.1 KiB
YAML

id: CVE-2024-46310
info:
name: FXServer < v9601 - Information Exposure
author: s4e-io
severity: medium
description: |
Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint.
reference:
- https://github.com/UwUtisum/CVE-2024-46310
- https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-46310
- https://vulners.com/githubexploit/D31ED8EC-1E21-54F9-AD42-778DAFBC8B4E
metadata:
verified: true
max-request: 1
vendor: fxserver
product: fxserver
tags: cve,cve2024,fxserver,info-leak
http:
- raw:
- |
GET /players.json HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains_all(body,"endpoint", "id", "identifiers", "name", "ping")'
- 'status_code == 200'
condition: and
# digest: 4a0a00473045022100d9a274ab1d307722eabda33966eabb2d925fc89c3971911cb043e5614dd0b5b502200a121647dbc8a9e1671b22a5404bf26c3a798f3a10ce710834a5b3f7ba3c5215:922c64590222798bb761d5b6d8e72950