.. / CVE-2024-41628

Exploit for Cluster Control CMON API - Directory Traversal (CVE-2024-41628)

Description:

Directory Traversal vulnerability in Severalnines Cluster Control 1.9.8 before 1.9.8-9778, 2.0.0 before 2.0.0-9779, and 2.1.0 before 2.1.0-9780 allows a remote attacker to include and display file content in an HTTP request via the CMON API.

Nuclei Template

View the template here CVE-2024-41628.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2024/CVE-2024-41628.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2024-41628
https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-41628
https://cvefeed.io/vuln/detail/CVE-2024-41628
https://github.com/Redshift-CyberSecurity/CVE-2024-41628
https://vuldb.com/?id.272533