Closed hhhharshil closed 9 months ago
Hi @hhhharshil we already have a template for this http/misconfiguration/screenconnect-authentication-bypass.yaml
so we are closing this issue
Thanks
@DhiyaneshGeek hi I understand that however there might be some issues with that template it is looking for a 200 response code to be returned when the path /SetupWizard.aspx/{whatever-you-want} is hit this wouldn't accurately detect the vulnerability. Vulnerable instances actually respond with a 500 from some testing that I have done. This route actually doesnt even exist on patched versions too
@hhhharshil feel free to update the existing template and raise a PR.
You can also join our discord server and DM me with more details about this
Thanks
404 - page not found
Hi @sec13b The vulnerability has been assigned a CVE, so we have moved here http/cves/2024/CVE-2024-1709.yaml
thank you.
Template Information:
This is a template to detect vulnerable instances of screenconnect per https://www.cvedetails.com/cve/CVE-2024-1709/
Nuclei Template:
This template is a bit more accurate as vulnerable instances would return a 500 if SetupWizard.aspx is requested I tested this against both patched and unpatched instances by using results from the shodan queries.
Patched instances: https://www.shodan.io/search?query=Server%3A+ScreenConnect%2F23.9.8.8811
Unpatched: https://www.shodan.io/search?query=Server%3A+ScreenConnect+-%22ScreenConnect%2F23.9.8.8811%22