Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AI PRP: Request CVE-2020-17526 Auth Bypass in Airflow #428

Closed
maoning opened this issue Mar 18, 2024 · 12 comments
Closed

AI PRP: Request CVE-2020-17526 Auth Bypass in Airflow #428

maoning opened this issue Mar 18, 2024 · 12 comments
Assignees
Labels
ai-bounty-prp Identify an AI bounty plugin PRP:Accepted

Comments

@maoning
Copy link
Collaborator

maoning commented Mar 18, 2024

https://github.com/projectdiscovery/nuclei-templates/blob/b686b1aea279093c30b35486db65a0e9917b66c4/http/cves/2020/CVE-2020-17526.yaml#L4

Please chain the Nuclei template with better verification like triggering a OOB callback.

Please read the rules of engagement first at #409.

@maoning maoning added help wanted Extra attention is needed ai-bounty-prp Identify an AI bounty plugin labels Mar 18, 2024
@am0o0
Copy link
Contributor

am0o0 commented Mar 19, 2024

Hi, I would like to start working on writing a plugin.

@maoning
Copy link
Collaborator Author

maoning commented Mar 20, 2024

Hi @am0o0 ,

Thank you for picking up this request! Please make sure the following items are completed before the plugin implementation:

  • Conduct vulnerability research with a brief description of how the plugin would work
  • Submit the vulnerable configuration of the target application to google/security-testbeds.

@maoning maoning added PRP:Accepted and removed help wanted Extra attention is needed labels Mar 20, 2024
@am0o0
Copy link
Contributor

am0o0 commented Mar 25, 2024

the easy part was the setup the vulnerable version and bypass the authentication, the hard part was the RCE :))

I exploited one of the default DAGs with the name example_trigger_target_dag and inserted my parameter when I wanted to trigger the DAG.

I tested the OOB callback and everything is fine and quick.
image

@am0o0
Copy link
Contributor

am0o0 commented Mar 28, 2024

@maoning I think you forgot about his submission, can I start working on this? did I provide what you want as "vulnerability research" in the desired way?

@maoning
Copy link
Collaborator Author

maoning commented Mar 30, 2024

@am0o0 Providing more details in the vulnerability research could help make the review process faster. Could you add the network requests you used to do the auth bypass as well as OOB request triggering? Thanks!

@maoning
Copy link
Collaborator Author

maoning commented Mar 30, 2024

I see a few users are set in the configuration, there are airflow user, postgres and redis user. Do you know if the ones you have for the security-testbeds are the default ones mentioned by the official documentation or they are only from the vulnhub config?

@am0o0
Copy link
Contributor

am0o0 commented Mar 30, 2024

add the network requests you used to do the auth bypass as well as OOB request triggering?

it is added now! sorry I didn't automate it, you need a little bit copy and replace.

I see a few users are set in the configuration, there are airflow user, postgres and redis user. Do you know if the ones you have for the security-testbeds are the default ones mentioned by the official documentation or they are only from the vulnhub config?

there is no need to know about default configuration, the only thing that we need is the user with id 1 which is admin, and the Python script creates it for us automatically. we can test for user_ids with number 2, 3 and more but 1 must be exist.

@am0o0
Copy link
Contributor

am0o0 commented Mar 30, 2024

update: the first user can be a regular user because a regular user can trigger the vulnerable DAG for testing the OOB.

@maoning
Copy link
Collaborator Author

maoning commented Apr 2, 2024

@am0o0 Please submit our participation form and you can start working on the development.

@am0o0
Copy link
Contributor

am0o0 commented Apr 2, 2024

Oh, @maoning there is already a plugin request exactly for what I did here, the post-authentication RCE has assigned by a CVE that in following issue is mentioned :) but I found it myself again here.

#400

I can implement a plugin with RCE payload and callback instead of only checking the auth-bypass in mentioned issue.

@maoning
Copy link
Collaborator Author

maoning commented Apr 2, 2024

@am0o0 Thank you for bringing this to my attention. The #400 escaped my notice because it is under a different CVE. I agree that these 2 plugins overlap, and I would like to merge in the one with RCE verification. You can continue with the implementation.

@tooryx
Copy link
Member

tooryx commented Jun 7, 2024

Hi @am0o0,

This contribution has been merged and the panel has decided on the reward. You should receive an update on the tracker in a few minutes.

~tooryx

@tooryx tooryx closed this as completed Jun 7, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
ai-bounty-prp Identify an AI bounty plugin PRP:Accepted
Projects
None yet
Development

No branches or pull requests

3 participants