Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-24637
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Open Web Analytics Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Open Web Analytics Server是用于Google Analytics 等商业 Web 分析工具的开源替代方案。 Open Web Analytics 1.7.4版本存在安全漏洞,该漏洞源于使用 php 生成的文件(而不是预期的 php 序列)不是由 PHP 解释器处理的。未经身份验证的攻击者可以通过缓冲哈希利用该漏洞获取敏感用户信息和管理员权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2022-24637
#POC DescriptionSource LinkShenlong Link
1Unauthenticated RCE in Open Web Analytics (OWA) <1.7.4https://github.com/JacobEbben/CVE-2022-24637POC Details
2Unauthenticated RCE in Open Web Analytics (OWA) 1.7.3https://github.com/Lay0us1/CVE-2022-24637POC Details
3Unauthicated RCE for open-web-analytics(1.7.3)https://github.com/garySec/CVE-2022-24637POC Details
4Open Web Analytics (OWA) - Unauthenticated Remote Code Executionhttps://github.com/hupe1980/CVE-2022-24637POC Details
5FIxed exploit for CVE-2022-24637 (original xplt: https://www.exploit-db.com/exploits/51026)https://github.com/icebreack/CVE-2022-24637POC Details
6Open Web Analytics 1.7.3 - Remote Code Executionhttps://github.com/Pflegusch/CVE-2022-24637POC Details
7Unauthenticated RCE in Open Web Analytics version <1.7.4https://github.com/0xM4hm0ud/CVE-2022-24637POC Details
8CVE-2022-24637https://github.com/c0derpwner/HTB-pwnedPOC Details
9Open Web Analytics 1.7.3 - Remote Code Execution Exploit v2https://github.com/0xRyuk/CVE-2022-24637POC Details
10Unauthenticated RCE in Open Web Analytics (OWA) 1.7.3https://github.com/Lay0us/CVE-2022-24637POC Details
11Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-24637.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-24637
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-24637

No comments yet


Leave a comment