2024-12-08 03:06:42 +00:00

88 lines
3.9 KiB
JSON

{
"id": "CVE-2024-32651",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-04-26T00:15:08.550",
"lastModified": "2024-11-21T09:15:23.947",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "changedetection.io is an open source web page change detection, website watcher, restock monitor and notification service. There is a Server Side Template Injection (SSTI) in Jinja2 that allows Remote Command Execution on the server host. Attackers can run any system command without any restriction and they could use a reverse shell. The impact is critical as the attacker can completely takeover the server machine. This can be reduced if changedetection is behind a login page, but this isn't required by the application (not by default and not enforced)."
},
{
"lang": "es",
"value": "changetection.io es un servicio de detecci\u00f3n de cambios de p\u00e1ginas web, seguimiento de sitios web, monitor de reabastecimiento y notificaci\u00f3n de c\u00f3digo abierto. Hay una inyecci\u00f3n de plantilla del lado del servidor (SSTI) en Jinja2 que permite la ejecuci\u00f3n remota de comandos en el host del servidor. Los atacantes pueden ejecutar cualquier comando del sistema sin ninguna restricci\u00f3n y podr\u00edan usar un shell inverso. El impacto es cr\u00edtico ya que el atacante puede apoderarse completamente de la m\u00e1quina servidor. Esto se puede reducir si la detecci\u00f3n de cambios est\u00e1 detr\u00e1s de una p\u00e1gina de inicio de sesi\u00f3n, pero la aplicaci\u00f3n no lo requiere (no es de forma predeterminada ni obligatorio)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"references": [
{
"url": "https://blog.hacktivesecurity.com/index.php/2024/05/08/cve-2024-32651-server-side-template-injection-changedetection-io/",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/dgtlmoon/changedetection.io/releases/tag/0.45.21",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-4r7v-whpg-8rx3",
"source": "security-advisories@github.com"
},
{
"url": "https://www.onsecurity.io/blog/server-side-template-injection-with-jinja2",
"source": "security-advisories@github.com"
},
{
"url": "https://blog.hacktivesecurity.com/index.php/2024/05/08/cve-2024-32651-server-side-template-injection-changedetection-io/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/dgtlmoon/changedetection.io/releases/tag/0.45.21",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-4r7v-whpg-8rx3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.onsecurity.io/blog/server-side-template-injection-with-jinja2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}