Change Detection - Server Side Template Injection
ID: CVE-2024-32651
Severity: critical
Author: edoardottt
Tags: cve,cve2024,changedetection,ssti,rce,passive
Description
Section titled “Description”A Server Side Template Injection in changedetection.io caused by usage of unsafe functions of Jinja2 allows Remote Command Execution on the server host.
YAML Source
Section titled “YAML Source”id: CVE-2024-32651
info: name: Change Detection - Server Side Template Injection author: edoardottt severity: critical description: | A Server Side Template Injection in changedetection.io caused by usage of unsafe functions of Jinja2 allows Remote Command Execution on the server host. reference: - https://nvd.nist.gov/vuln/detail/CVE-2024-32651 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-4r7v-whpg-8rx3 - https://github.com/dgtlmoon/changedetection.io/releases/tag/0.45.21 - https://www.onsecurity.io/blog/server-side-template-injection-with-jinja2 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10 cve-id: CVE-2024-32651 cwe-id: CWE-1336 epss-score: 0.00065 epss-percentile: 0.28259 metadata: verified: true max-request: 1 shodan-query: html:"Change Detection" tags: cve,cve2024,changedetection,ssti,rce,passive
http: - method: GET path: - "{{RootURL}}/"
redirects: true max-redirects: 2
extractors: - type: xpath name: version internal: true xpath: - "//*[@id=\"right-sticky\"]"
matchers-condition: and matchers: - type: status status: - 200
- type: word part: body words: - "Change Detection" condition: and
- type: dsl dsl: - compare_versions(version, '<= 0.45.20')# digest: 4a0a00473045022100e3edb225deeeb92ac88a33d8b623f6a66810d7c6afae745682dfd196837de04102206958110bf9775de18985720ee94569d6d3faae477868bfffba12c9b384374feb:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "passive/cves/2024/CVE-2024-32651.yaml"