Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-42849 PoC — Silverpeas 安全漏洞

Source
Associated Vulnerability
Title:Silverpeas 安全漏洞 (CVE-2024-42849)
Description:Silverpeas是Silverpeas开源的一套开源的业务协作平台。该平台包括项目管理、博客、论坛和文档管理等应用程序。 Silverpeas v.6.4.2及之前版本存在安全漏洞,该漏洞源于允许远程攻击者通过密码更改功能导致拒绝服务。
Description
An issue in Silverpeas v.6.4.2 and lower allows a remote attacker to cause a denial of service via the password change function.
Readme
# CVE-2024-42849
An issue in Silverpeas v.6.4.2 and lower allows a remote attacker to cause a denial of service via the password change function.

## Writeup
If the password change request is intercepted and a sufficiently long(1MB) string is supplied as the password to use, system resources will be overwhelmed by the attempt to hash the password and cause a DoS.

## Proof of Concept(PoC)/Steps to Reproduce
1. Generate a 1MB long string.

![Generate a long string](https://github.com/njmbb8/CVE-2024-42849/blob/main/command.PNG?raw=true)

2. Intercept request using Burpsuite or similar, send it to Intruder and set the new and confirmation passwords as payload positions.

![Sending request to intruder](https://github.com/njmbb8/CVE-2024-42849/blob/main/send2intruder.PNG?raw=true)

3. Load the file generated in step 1 as a payload.

![Setting the payload](https://github.com/njmbb8/CVE-2024-42849/blob/main/intruder1.PNG?raw=true)

4. Once the attack is started, resource usage should skyrocket and the Silverpeas application will become unresponsive.

![High resource usage](https://github.com/njmbb8/CVE-2024-42849/blob/main/usage.PNG?raw=true)
File Snapshot

[4.0K] /data/pocs/6dbba86c100fda8f17e54336568ce832bfcbdcbd ├── [ 50K] command.PNG ├── [ 42K] intruder1.PNG ├── [1.1K] README.md ├── [150K] send2intruder.PNG └── [ 688] usage.PNG 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.