Skip to content

Instantly share code, notes, and snippets.

@damodarnaik
Created October 17, 2023 17:51
Show Gist options
  • Save damodarnaik/9cc76c6b320510c34a0a668bd7439f7b to your computer and use it in GitHub Desktop.
Save damodarnaik/9cc76c6b320510c34a0a668bd7439f7b to your computer and use it in GitHub Desktop.
CVE-2023-24515

CVE-2023-24515

Vulnerability Title: Server side request forgery - Api checker Module
Vendor Homepage: https://pandorafms.com/en/
Version: <= v767
CVE: CVE-2023-24515
CVSS 3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N (6.5 Medium)
Exploit Author: Damodar Naik
Date: 08/22/2023

Steps to reproduce:

  1. Login as evil admin user.
  2. Go to Admin tools -> Api checker.
  3. Enter file:///etc/passwd in the custom URL section & observe the response.
  4. To make it more interesting, use file:///var/www/html/pandora_console/pandoradb_data.sql as the url value & observe DB file content being loaded in the response.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment