Skip to content

FXServer < v9601 - Information Exposure

ID: CVE-2024-46310

Severity: medium

Author: s4e-io

Tags: cve,cve2024,fxserver,info-leak

Incorrect Access Control in FXServer version’s v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint.

id: CVE-2024-46310
info:
name: FXServer < v9601 - Information Exposure
author: s4e-io
severity: medium
description: |
Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint.
reference:
- https://github.com/UwUtisum/CVE-2024-46310
- https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-46310
- https://vulners.com/githubexploit/D31ED8EC-1E21-54F9-AD42-778DAFBC8B4E
metadata:
verified: true
max-request: 1
vendor: fxserver
product: fxserver
tags: cve,cve2024,fxserver,info-leak
http:
- raw:
- |
GET /players.json HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'contains_all(body,"endpoint", "id", "identifiers", "name", "ping")'
- 'status_code == 200'
condition: and
# digest: 4b0a00483046022100a3d5cd3dcf20ecaaa25a59a7b941e253e56a32f51e3a71083f71948aad77971e022100fdc29b8b527eb662bf5e0e731464f1b013549c564db13cdf37cd428e2912ab2d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-46310.yaml"

View on Github