Vulnerability Details : CVE-2021-32682
Public exploit exists!
elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.
Vulnerability category: Directory traversalServer-side request forgery (SSRF) Execute code
Products affected by CVE-2021-32682
- cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-32682
92.95%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2021-32682
-
elFinder Archive Command Injection
Disclosure Date: 2021-06-13First seen: 2022-12-23exploit/linux/http/elfinder_archive_cmd_injectionelFinder versions below 2.1.59 are vulnerable to a command injection vulnerability via its archive functionality. When creating a new zip archive, the `name` parameter is sanitized with the `escapeshellarg()` php function and then passed to the `zi
CVSS scores for CVE-2021-32682
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2021-32682
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: security-advisories@github.com (Primary)
-
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.Assigned by: security-advisories@github.com (Primary)
-
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.Assigned by: security-advisories@github.com (Primary)
References for CVE-2021-32682
-
https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17
Merge pull request from GHSA-wph3-44rj-92pr · Studio-42/elFinder@a106c35 · GitHubPatch;Third Party Advisory
-
http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html
elFinder Archive Command Injection ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/
elFinder - A Case Study of Web File Manager VulnerabilitiesExploit;Third Party Advisory
-
https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr
Multiple vulnerabilities leading to RCE · Advisory · Studio-42/elFinder · GitHubThird Party Advisory
Jump to