POC详情: f242f1073b3bee9de8378c2e0b7bdb1adca5c544

来源
关联漏洞
标题: Kaiten 安全漏洞 (CVE-2024-41276)
描述:Kaiten是Kaiten公司的一个员工管理平台。 Kaiten 57.131.12版本及之前版本存在安全漏洞,该漏洞源于允许攻击者绕过PIN码身份验证机制,攻击者能够执行暴力攻击以猜测正确的PIN并获得对应用程序的未经授权的访问权限。
介绍
# CVE-2024-41276 (Kaiten Authentication Bypass)
[Kaiten](https://kaiten.ru/) - a workflow management system.
A vulnerability in Kaiten allows attackers to bypass the PIN code authentication mechanism. The application requires users to input a 6-digit PIN code sent to their email for authorization after entering their login credentials. However, the request limiting mechanism can be easily bypassed, enabling attackers to perform a brute force attack to guess the correct PIN and gain unauthorized access to the application.

**Details:**

Authentication mechanism use one factor sended on e-mail, without any password :)
Bypassing rate limits can be achieved by using the `X-Forwarded-For` header, which allows the `X-RateLimit-Remaining` counter to reset.

![](brute_1.png)

This method enables continued requests without receiving `HTTP 429 Too Many Requests` responses, which usually occur after multiple attempts. 

![](no_limits.png)

So also there are no limits to request new PIN Code => attacker can guess pin code using brute force attack. Expiry time of PIN Code 5 minutes, there are attacker have got 5 minutes to try guess 6-digit PIN-Code.
With **~150 RPS** attacker can try **~45,000** PIN Codes. After all attempts with math calculcation success probability 50% can be reached with 33 minutes and 100% with 4 hours.


**Vulnerable versions:**

`<= 57.131.12`


**Links:**

[CVE MITRE Description](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41276)

[NVD CVE](https://nvd.nist.gov/vuln/detail/CVE-2024-41276)

## Usage
Simple download bash script and run with selected username _(only login, not e-mails!)_

```bash
bash CVE-2024-41276.sh  <input_user> <kaiten.example.com>
```
As Result:
Successfull result => Obtain a valid cookie to futher usage

![Kaiten_sploit](CVE-2024-41276_exploit.png)


## Mitigation
- Update Kaiten software to last version
- Implement basic CAPTCHA or rate limits
- Block IP-address temporary
文件快照

[4.0K] /data/pocs/f242f1073b3bee9de8378c2e0b7bdb1adca5c544 ├── [342K] brute_1.png ├── [123K] CVE-2024-41276_exploit.png ├── [2.9K] CVE-2024-41276.sh ├── [105K] no_limits.png └── [1.9K] README.md 0 directories, 5 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。