CVE-2024-56363 (GCVE-0-2024-56363)

Vulnerability from cvelistv5 – Published: 2024-12-23 17:23 – Updated: 2024-12-24 01:32
VLAI?
Summary
APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based automated reporting tool designed for penetration testers and security organizations. In 1.0, there is a vulnerability in the web application's handling of user-supplied input that is incorporated into a Jinja2 template. Specifically, when user input is improperly sanitized or validated, an attacker can inject Jinja2 syntax into the template, causing the server to execute arbitrary code. For example, an attacker might be able to inject expressions like {{ config }}, {{ self.class.mro[1].subclasses() }}, or more dangerous payloads that trigger execution of arbitrary Python code. The vulnerability can be reproduced by submitting crafted input to all the template fields handled by ckeditor, that are passed directly to a Jinja2 template. If the input is rendered without sufficient sanitization, it results in the execution of malicious Jinja2 code on the server.
CWE
  • CWE-97 - Improper Neutralization of Server-Side Includes (SSI) Within a Web Page
Assigner
Impacted products
Vendor Product Version
APTRS APTRS Affected: = 1.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-56363",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-24T01:32:36.369137Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-24T01:32:59.318Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "APTRS",
          "vendor": "APTRS",
          "versions": [
            {
              "status": "affected",
              "version": "= 1.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based automated reporting tool designed for penetration testers and security organizations. In 1.0, there is a vulnerability in the web application\u0027s handling of user-supplied input that is incorporated into a Jinja2 template. Specifically, when user input is improperly sanitized or validated, an attacker can inject Jinja2 syntax into the template, causing the server to execute arbitrary code. For example, an attacker might be able to inject expressions like {{ config }}, {{ self.class.mro[1].subclasses() }}, or more dangerous payloads that trigger execution of arbitrary Python code. The vulnerability can be reproduced by submitting crafted input to all the template fields handled by ckeditor, that are passed directly to a Jinja2 template. If the input is rendered without sufficient sanitization, it results in the execution of malicious Jinja2 code on the server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-97",
              "description": "CWE-97: Improper Neutralization of Server-Side Includes (SSI) Within a Web Page",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-12-23T17:23:57.120Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/APTRS/APTRS/security/advisories/GHSA-h4w2-hvcg-938j",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/APTRS/APTRS/security/advisories/GHSA-h4w2-hvcg-938j"
        },
        {
          "name": "https://github.com/APTRS/APTRS/commit/9f6b6e4a56a9119eb12126a4909441e83b6d7c11",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/APTRS/APTRS/commit/9f6b6e4a56a9119eb12126a4909441e83b6d7c11"
        }
      ],
      "source": {
        "advisory": "GHSA-h4w2-hvcg-938j",
        "discovery": "UNKNOWN"
      },
      "title": "APTRS has SSTI vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-56363",
    "datePublished": "2024-12-23T17:23:57.120Z",
    "dateReserved": "2024-12-20T17:34:56.867Z",
    "dateUpdated": "2024-12-24T01:32:59.318Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based automated reporting tool designed for penetration testers and security organizations. In 1.0, there is a vulnerability in the web application\u0027s handling of user-supplied input that is incorporated into a Jinja2 template. Specifically, when user input is improperly sanitized or validated, an attacker can inject Jinja2 syntax into the template, causing the server to execute arbitrary code. For example, an attacker might be able to inject expressions like {{ config }}, {{ self.class.mro[1].subclasses() }}, or more dangerous payloads that trigger execution of arbitrary Python code. The vulnerability can be reproduced by submitting crafted input to all the template fields handled by ckeditor, that are passed directly to a Jinja2 template. If the input is rendered without sufficient sanitization, it results in the execution of malicious Jinja2 code on the server.\"}, {\"lang\": \"es\", \"value\": \"APTRS (Sistema automatizado de informes de pruebas de penetraci\\u00f3n) es una herramienta de informes automatizada basada en Python y Django manipulada para evaluadores de penetraci\\u00f3n y organizaciones de seguridad. En 1.0, hay una vulnerabilidad en la gesti\\u00f3n por parte de la aplicaci\\u00f3n web de la entrada proporcionada por el usuario que se incorpora a una plantilla Jinja2. Espec\\u00edficamente, cuando la entrada del usuario se desinfecta o valida incorrectamente, un atacante puede inyectar la sintaxis de Jinja2 en la plantilla, lo que hace que el servidor ejecute c\\u00f3digo arbitrario. Por ejemplo, un atacante podr\\u00eda inyectar expresiones como {{ config }}, {{ self.class.mro[1].subclasses() }} o payloads m\\u00e1s peligrosos que desencadenan la ejecuci\\u00f3n de c\\u00f3digo Python arbitrario. La vulnerabilidad se puede reproducir enviando entradas manipuladas a todos los campos de plantilla manejados por ckeditor, que se pasan directamente a una plantilla Jinja2. Si la entrada se procesa sin una desinfecci\\u00f3n suficiente, se produce la ejecuci\\u00f3n de c\\u00f3digo Jinja2 malicioso en el servidor.\"}]",
      "id": "CVE-2024-56363",
      "lastModified": "2024-12-23T18:15:07.767",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}]}",
      "published": "2024-12-23T18:15:07.767",
      "references": "[{\"url\": \"https://github.com/APTRS/APTRS/commit/9f6b6e4a56a9119eb12126a4909441e83b6d7c11\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/APTRS/APTRS/security/advisories/GHSA-h4w2-hvcg-938j\", \"source\": \"security-advisories@github.com\"}]",
      "sourceIdentifier": "security-advisories@github.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-97\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-56363\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-12-23T18:15:07.767\",\"lastModified\":\"2024-12-23T18:15:07.767\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based automated reporting tool designed for penetration testers and security organizations. In 1.0, there is a vulnerability in the web application\u0027s handling of user-supplied input that is incorporated into a Jinja2 template. Specifically, when user input is improperly sanitized or validated, an attacker can inject Jinja2 syntax into the template, causing the server to execute arbitrary code. For example, an attacker might be able to inject expressions like {{ config }}, {{ self.class.mro[1].subclasses() }}, or more dangerous payloads that trigger execution of arbitrary Python code. The vulnerability can be reproduced by submitting crafted input to all the template fields handled by ckeditor, that are passed directly to a Jinja2 template. If the input is rendered without sufficient sanitization, it results in the execution of malicious Jinja2 code on the server.\"},{\"lang\":\"es\",\"value\":\"APTRS (Sistema automatizado de informes de pruebas de penetraci\u00f3n) es una herramienta de informes automatizada basada en Python y Django manipulada para evaluadores de penetraci\u00f3n y organizaciones de seguridad. En 1.0, hay una vulnerabilidad en la gesti\u00f3n por parte de la aplicaci\u00f3n web de la entrada proporcionada por el usuario que se incorpora a una plantilla Jinja2. Espec\u00edficamente, cuando la entrada del usuario se desinfecta o valida incorrectamente, un atacante puede inyectar la sintaxis de Jinja2 en la plantilla, lo que hace que el servidor ejecute c\u00f3digo arbitrario. Por ejemplo, un atacante podr\u00eda inyectar expresiones como {{ config }}, {{ self.class.mro[1].subclasses() }} o payloads m\u00e1s peligrosos que desencadenan la ejecuci\u00f3n de c\u00f3digo Python arbitrario. La vulnerabilidad se puede reproducir enviando entradas manipuladas a todos los campos de plantilla manejados por ckeditor, que se pasan directamente a una plantilla Jinja2. Si la entrada se procesa sin una desinfecci\u00f3n suficiente, se produce la ejecuci\u00f3n de c\u00f3digo Jinja2 malicioso en el servidor.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-97\"}]}],\"references\":[{\"url\":\"https://github.com/APTRS/APTRS/commit/9f6b6e4a56a9119eb12126a4909441e83b6d7c11\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/APTRS/APTRS/security/advisories/GHSA-h4w2-hvcg-938j\",\"source\":\"security-advisories@github.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-56363\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-24T01:32:36.369137Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-24T01:32:54.636Z\"}}], \"cna\": {\"title\": \"APTRS has SSTI vulnerability\", \"source\": {\"advisory\": \"GHSA-h4w2-hvcg-938j\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"APTRS\", \"product\": \"APTRS\", \"versions\": [{\"status\": \"affected\", \"version\": \"= 1.0\"}]}], \"references\": [{\"url\": \"https://github.com/APTRS/APTRS/security/advisories/GHSA-h4w2-hvcg-938j\", \"name\": \"https://github.com/APTRS/APTRS/security/advisories/GHSA-h4w2-hvcg-938j\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/APTRS/APTRS/commit/9f6b6e4a56a9119eb12126a4909441e83b6d7c11\", \"name\": \"https://github.com/APTRS/APTRS/commit/9f6b6e4a56a9119eb12126a4909441e83b6d7c11\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"APTRS (Automated Penetration Testing Reporting System) is a Python and Django-based automated reporting tool designed for penetration testers and security organizations. In 1.0, there is a vulnerability in the web application\u0027s handling of user-supplied input that is incorporated into a Jinja2 template. Specifically, when user input is improperly sanitized or validated, an attacker can inject Jinja2 syntax into the template, causing the server to execute arbitrary code. For example, an attacker might be able to inject expressions like {{ config }}, {{ self.class.mro[1].subclasses() }}, or more dangerous payloads that trigger execution of arbitrary Python code. The vulnerability can be reproduced by submitting crafted input to all the template fields handled by ckeditor, that are passed directly to a Jinja2 template. If the input is rendered without sufficient sanitization, it results in the execution of malicious Jinja2 code on the server.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-97\", \"description\": \"CWE-97: Improper Neutralization of Server-Side Includes (SSI) Within a Web Page\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-12-23T17:23:57.120Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-56363\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-24T01:32:59.318Z\", \"dateReserved\": \"2024-12-20T17:34:56.867Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-12-23T17:23:57.120Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…