目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2024-46627 PoC — DATAGERRY 安全漏洞

来源
关联漏洞
标题:DATAGERRY 安全漏洞 (CVE-2024-46627)
Description:DATAGERRY是DATAGerry开源的一个开源 CMDB 和资产管理工具。 DATAGERRY 2.2版本存在安全漏洞,该漏洞源于存在不正确权限改造,允许攻击者通过精心设计的Web请求执行任意命令。
Description
CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests.
介绍
# __CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests.__ #

DATAGERRY v2.2 lacks access control in the REST API for the following endpoints:

`/rest/users/<id>/settings/` (GET, POST)

`/rest/users/<id>/settings/<setting>` (DELETE, PUT)

This allows an attacker to read settings, create settings, delete settings, and update settings of any user without authentication.

__Additional information__
- To reproduce this it's possible to use the docker setup here: https://datagerry.readthedocs.io/en/latest/admin_guide/setup.html (as of 25th Sept 2024).
- It's possible to determine valid payloads from the information here: https://datagerry.readthedocs.io/en/latest/api/rest/user-management.html#settings
- See the following for repro steps with pictures: https://daly.wtf/cve-2024-46627-incorrect-access-control-in-becn-datagerry-v2-2-allows-attackers-to-execute-arbitrary-commands-via-crafted-web-requests/


__This is expected to be fixed in the next release.__

Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46627
文件快照

[4.0K] /data/pocs/c6bcef3e77b578ae2f2663a1ddbf3254392cafd1 └── [1.1K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。