Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create CVE-2021-44103 #4021

Merged
merged 4 commits into from
Apr 2, 2022
Merged

Conversation

rschio
Copy link
Contributor

@rschio rschio commented Apr 1, 2022

Template / PR Information

Template Validation

I've validated this template locally?

  • YES
  • NO

Additional Details (leave it blank if not applicable)

Konga versions <= 0.14.9 are vulnerable to privilege escalation. It is
possible to update a user and change the admin parameter to true.

Running the command nuclei -t ./CVE-2021-44103.yaml -u http://localhost:1337 -debug returns a match:

HTTP/1.1 200 OK                                                                                                                                                                               
Connection: close                                                                                                                                                                             
Transfer-Encoding: chunked                                                                                                                                                                    
Content-Type: text/html; charset=utf-8                                                                                                                                                        
Date: Fri, 01 Apr 2022 07:53:11 GMT                                                                                                                                                           
Etag: W/"197a-JWWS89uYeXw0FmYwstO+DA"                                                                                                                                                         
Vary: Accept-Encoding                                                                                                                                                                         
X-Powered-By: Sails <sailsjs.org>                                                                                                                                                             
                                                                                                                                                                                              
<!DOCTYPE html>                                                                                                                                                                               
<html id="konga">                                                                                                                                                                             
<head>                                                                                                                                                                                        
    <title>Konga</title>                                                                                                                                                                      
                                                                                                                                                                         
...

<script>
  window.enableLogs = false;
  window.konga_version = "0.14.9";
  window.no_auth = false;
  window.initAngular = true;
</script>

...

[2022-04-01 03:56:32] [CVE-2021-44103:word-1] [http] [high] http://localhost:1337
[2022-04-01 03:56:32] [CVE-2021-44103:regex-2] [http] [high] http://localhost:1337
[2022-04-01 03:56:32] [CVE-2021-44103:status-3] [http] [high] http://localhost:1337

Additional References:

rschio and others added 3 commits April 1, 2022 03:39
Konga versions <= 0.14.9 are vulnerable to privilege escalation. It is
possible to update a user and change the admin parameter to true.
@princechaddha
Copy link
Member

Hello @rschio, thank you so much for sharing this template with the community and contributing to this project 🚀
As much as possible, we try adding templates with full POCs, instead of just version-based detection which may result in false positives or negatives. I have made a few changes to verify this CVE.

We can run this template like this: nuclei -t cves/2021/CVE-2021-44103.yaml -debug -u "http://127.0.0.1:1337" -var username=demo -var password=demo123

@princechaddha princechaddha added the good first issue Good for newcomers label Apr 2, 2022
@princechaddha princechaddha merged commit a0b1904 into projectdiscovery:master Apr 2, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
good first issue Good for newcomers
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants