Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-46627 PoC — DATAGERRY 安全漏洞

Source
Associated Vulnerability
Title:DATAGERRY 安全漏洞 (CVE-2024-46627)
Description:DATAGERRY是DATAGerry开源的一个开源 CMDB 和资产管理工具。 DATAGERRY 2.2版本存在安全漏洞,该漏洞源于存在不正确权限改造,允许攻击者通过精心设计的Web请求执行任意命令。
Description
CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests.
Readme
# __CVE-2024-46627 - Incorrect access control in BECN DATAGERRY v2.2 allows attackers to > execute arbitrary commands via crafted web requests.__ #

DATAGERRY v2.2 lacks access control in the REST API for the following endpoints:

`/rest/users/<id>/settings/` (GET, POST)

`/rest/users/<id>/settings/<setting>` (DELETE, PUT)

This allows an attacker to read settings, create settings, delete settings, and update settings of any user without authentication.

__Additional information__
- To reproduce this it's possible to use the docker setup here: https://datagerry.readthedocs.io/en/latest/admin_guide/setup.html (as of 25th Sept 2024).
- It's possible to determine valid payloads from the information here: https://datagerry.readthedocs.io/en/latest/api/rest/user-management.html#settings
- See the following for repro steps with pictures: https://daly.wtf/cve-2024-46627-incorrect-access-control-in-becn-datagerry-v2-2-allows-attackers-to-execute-arbitrary-commands-via-crafted-web-requests/


__This is expected to be fixed in the next release.__

Ref: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46627
File Snapshot

[4.0K] /data/pocs/c6bcef3e77b578ae2f2663a1ddbf3254392cafd1 └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.