CVE-2021-44664

An Authenticated Remote Code Exection (RCE) vulnerability exists in Xerte through 3.9 in website_code/php/import/fileupload.php by uploading a maliciously crafted PHP file though the project interface disguised as a language file to bypasses the upload filters. Attackers can manipulate the files destination by abusing path traversal in the 'mediapath' variable.
Configurations

Configuration 1 (hide)

cpe:2.3:a:xerte:xerte:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:31

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/166182/Xerte-3.9-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/166182/Xerte-3.9-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/thexerteproject/xerteonlinetoolkits/commit/1672d6f46bbd6f6d42f0903ce9a313927ae2836b#diff-27433bb0be90e431d40986f9afebe9ee2f8d1025a7f9e55c3cd7a86f1f8e3fdc - Patch, Third Party Advisory () https://github.com/thexerteproject/xerteonlinetoolkits/commit/1672d6f46bbd6f6d42f0903ce9a313927ae2836b#diff-27433bb0be90e431d40986f9afebe9ee2f8d1025a7f9e55c3cd7a86f1f8e3fdc - Patch, Third Party Advisory
References () https://github.com/thexerteproject/xerteonlinetoolkits/commit/6daeb81d089d4a561e22f931fff1327660a7d1b5 - Patch, Third Party Advisory () https://github.com/thexerteproject/xerteonlinetoolkits/commit/6daeb81d089d4a561e22f931fff1327660a7d1b5 - Patch, Third Party Advisory
References () https://riklutz.nl/2021/11/03/authenticated-file-upload-to-remote-code-execution-in-xerte/ - Exploit, Third Party Advisory () https://riklutz.nl/2021/11/03/authenticated-file-upload-to-remote-code-execution-in-xerte/ - Exploit, Third Party Advisory

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-22

08 Mar 2022, 20:17

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.5
v3 : 8.8
CWE CWE-434
CPE cpe:2.3:a:xerte:xerte:*:*:*:*:*:*:*:*
References (MISC) http://packetstormsecurity.com/files/166182/Xerte-3.9-Remote-Code-Execution.html - (MISC) http://packetstormsecurity.com/files/166182/Xerte-3.9-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References (MISC) https://github.com/thexerteproject/xerteonlinetoolkits/commit/1672d6f46bbd6f6d42f0903ce9a313927ae2836b#diff-27433bb0be90e431d40986f9afebe9ee2f8d1025a7f9e55c3cd7a86f1f8e3fdc - (MISC) https://github.com/thexerteproject/xerteonlinetoolkits/commit/1672d6f46bbd6f6d42f0903ce9a313927ae2836b#diff-27433bb0be90e431d40986f9afebe9ee2f8d1025a7f9e55c3cd7a86f1f8e3fdc - Patch, Third Party Advisory
References (MISC) https://github.com/thexerteproject/xerteonlinetoolkits/commit/6daeb81d089d4a561e22f931fff1327660a7d1b5 - (MISC) https://github.com/thexerteproject/xerteonlinetoolkits/commit/6daeb81d089d4a561e22f931fff1327660a7d1b5 - Patch, Third Party Advisory
References (MISC) https://riklutz.nl/2021/11/03/authenticated-file-upload-to-remote-code-execution-in-xerte/ - (MISC) https://riklutz.nl/2021/11/03/authenticated-file-upload-to-remote-code-execution-in-xerte/ - Exploit, Third Party Advisory

02 Mar 2022, 19:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/166182/Xerte-3.9-Remote-Code-Execution.html -

24 Feb 2022, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-24 21:15

Updated : 2024-11-21 06:31


NVD link : CVE-2021-44664

Mitre link : CVE-2021-44664

CVE.ORG link : CVE-2021-44664


JSON object : View

Products Affected

xerte

  • xerte
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-434

Unrestricted Upload of File with Dangerous Type