114 lines
3.5 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2021-37770",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-06-30T15:15:07.947",
"lastModified": "2022-07-09T00:25:57.930",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Nucleus CMS v3.71 is affected by a file upload vulnerability. In this vulnerability, we can use upload to change the upload path to the path without the Htaccess file. Upload an Htaccess file and write it to AddType application / x-httpd-php.jpg. In this way, an attacker can upload a picture with shell, treat it as PHP, execute commands, so as to take down website resources."
},
{
"lang": "es",
"value": "Nucleus CMS versi\u00f3n v3.71, est\u00e1 afectado por una vulnerabilidad en la carga de archivos. En esta vulnerabilidad, podemos usar el upload para cambiar la ruta de subida a la ruta sin el archivo Htaccess. Subir un archivo Htaccess y escribirlo en la aplicaci\u00f3n AddType / x-httpd-php.jpg. De esta manera, un atacante puede subir una imagen con el shell, tratarla como PHP, ejecutar comandos, con el fin de derribar los recursos del sitio web"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nucleuscms:nucleus_cms:3.71:*:*:*:*:*:*:*",
"matchCriteriaId": "4419BE1B-193F-4EB5-A88B-B20D647D0215"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/NucleusCMS/NucleusCMS/issues/96",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://shimo.im/docs/Ch9CphJt8XwTvQ3d",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}