nuclei-templates/http/cves/2021/CVE-2021-32682.yaml

58 lines
2.3 KiB
YAML
Raw Normal View History

id: CVE-2021-32682
info:
name: elFinder 2.1.58 - Remote Code Execution
author: smaranchand
severity: critical
description: elFinder 2.1.58 is impacted by multiple remote code execution vulnerabilities that could allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration.
2023-09-06 12:09:01 +00:00
remediation: Update to elFinder 2.1.59 or later. As a workaround, ensure the connector is not exposed without authentication.
reference:
- https://smaranchand.com.np/2022/01/organization-vendor-application-security/
- https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities
- https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr
- https://nvd.nist.gov/vuln/detail/CVE-2021-32682
2023-07-11 19:49:27 +00:00
- https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-32682
2023-07-11 19:49:27 +00:00
cwe-id: CWE-22
epss-score: 0.9728
epss-percentile: 0.99811
2023-09-06 12:09:01 +00:00
cpe: cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*
metadata:
max-request: 9
2023-07-11 19:49:27 +00:00
vendor: std42
product: "elfinder"
2023-09-06 12:09:01 +00:00
github: https://github.com/Studio-42/elFinder
tags: cve,cve2021,elfinder,misconfig,rce,oss
http:
- method: GET
path:
- "{{BaseURL}}/admin/elfinder/elfinder-cke.html"
- "{{BaseURL}}/assets/backend/elfinder/elfinder-cke.html"
- "{{BaseURL}}/assets/elFinder-2.1.9/elfinder.html"
- "{{BaseURL}}/assets/elFinder/elfinder.html"
- "{{BaseURL}}/backend/elfinder/elfinder-cke.html"
- "{{BaseURL}}/elfinder/elfinder-cke.html"
- "{{BaseURL}}/uploads/assets/backend/elfinder/elfinder-cke.html"
- "{{BaseURL}}/uploads/assets/backend/elfinder/elfinder.html"
- "{{BaseURL}}/uploads/elfinder/elfinder-cke.html"
stop-at-first-match: true
2023-07-11 19:49:27 +00:00
matchers-condition: and
matchers:
- type: word
words:
- "elfinder"
- "php/connector"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100d2835ca35fa960d42e518bdfd069b573d72cab23ab5668824249be9d720b68df022100ff975a03260d3f3db68e1417f62b24149762f55c2302aace8a170ee2dc2b8ae8:922c64590222798bb761d5b6d8e72950