-
Notifications
You must be signed in to change notification settings - Fork 177
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AI PRP: Request CVE-2020-17526 Auth Bypass in Airflow #428
Comments
Hi, I would like to start working on writing a plugin. |
Hi @am0o0 , Thank you for picking up this request! Please make sure the following items are completed before the plugin implementation:
|
the easy part was the setup the vulnerable version and bypass the authentication, the hard part was the RCE :)) I exploited one of the default DAGs with the name |
@maoning I think you forgot about his submission, can I start working on this? did I provide what you want as "vulnerability research" in the desired way? |
@am0o0 Providing more details in the vulnerability research could help make the review process faster. Could you add the network requests you used to do the auth bypass as well as OOB request triggering? Thanks! |
I see a few users are set in the configuration, there are airflow user, postgres and redis user. Do you know if the ones you have for the security-testbeds are the default ones mentioned by the official documentation or they are only from the vulnhub config? |
it is added now! sorry I didn't automate it, you need a little bit copy and replace.
there is no need to know about default configuration, the only thing that we need is the user with id 1 which is admin, and the Python script creates it for us automatically. we can test for user_ids with number 2, 3 and more but 1 must be exist. |
update: the first user can be a regular user because a regular user can trigger the vulnerable DAG for testing the OOB. |
@am0o0 Please submit our participation form and you can start working on the development. |
Oh, @maoning there is already a plugin request exactly for what I did here, the post-authentication RCE has assigned by a CVE that in following issue is mentioned :) but I found it myself again here. I can implement a plugin with RCE payload and callback instead of only checking the auth-bypass in mentioned issue. |
Hi @am0o0, This contribution has been merged and the panel has decided on the reward. You should receive an update on the tracker in a few minutes. ~tooryx |
https://github.com/projectdiscovery/nuclei-templates/blob/b686b1aea279093c30b35486db65a0e9917b66c4/http/cves/2020/CVE-2020-17526.yaml#L4
Please chain the Nuclei template with better verification like triggering a OOB callback.
Please read the rules of engagement first at #409.
The text was updated successfully, but these errors were encountered: