POC详情: d66f08b51a55f60b8924fa23a3f8ab602366b953

来源
关联漏洞
标题: E-Staff 安全漏洞 (CVE-2024-40324)
描述:E-Staff是俄罗斯E-Staff公司的一个可靠的招聘工具,用于在服务器或云中进行招聘的现代综合解决方案,具有与任何系统和服务的广泛集成功能。 E-Staff 5.1版本存在安全漏洞。攻击者利用该漏洞可以将回车和换行符号插入到字段中来导致HTTP响应拆分和标头操纵。
介绍
# CVE-2024-40324

## Description

A CRLF injection vulnerability in E-Staff v5.1 allows attackers to insert Carriage Return (CR) and Line Feed (LF) characters into input fields, leading to HTTP response splitting and header manipulation.

## Vulnerability Type

CRLF

## Vendor of Product

E-Staff

## Affected Product Code Base

E-Staff 5.1 

## Affected Component

HTTP headers

## Attack Type

Remote

## Impact Code execution

Potential for arbitrary header injection, cache poisoning, and session hijacking, cross-site scripting (XSS),  and other exploits.

## Discoverer

- Aleksey Vistorobskiy

## Attack Vectors

An attacker can insert CRLF characters into input fields, manipulating HTTP headers. For example, injecting CRLF into HTTP headers can result in HTTP response splitting


Screenshot:
![](/1.png)

## Reference

- https://e-staff.ru/estaff_home
- https://github.com/aleksey-vi/CVE-2024-40324
文件快照

[4.0K] /data/pocs/d66f08b51a55f60b8924fa23a3f8ab602366b953 ├── [ 99K] 1.png └── [ 911] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。