.. / CVE-2022-24856

Exploit for Flyte Console <0.52.0 - Server-Side Request Forgery (CVE-2022-24856)

Description:

FlyteConsole is the web user interface for the Flyte platform. FlyteConsole prior to version 0.52.0 is vulnerable to server-side request forgery when FlyteConsole is open to the general internet. An attacker can exploit any user of a vulnerable instance to access the internal metadata server or other unauthenticated URLs. Passing of headers to an unauthorized actor may occur.

Nuclei Template

View the template here CVE-2022-24856.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-24856.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2022-24856
https://github.com/flyteorg/flyteconsole/security/advisories/GHSA-www6-hf2v-v9m9
https://hackerone.com/reports/1540906
https://github.com/flyteorg/flyteconsole/commit/05b88ed2d2ecdb5d8a8404efea25414e57189709
https://github.com/flyteorg/flyteconsole/pull/389