// For flags

CVE-2021-32630

Various

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.0.4, there is an authenticated RCE via .phar file upload. A php web shell can be uploaded via the Documents & Files upload feature. Someone with upload permissions could rename the php shell with a .phar extension, visit the file, triggering the payload for a reverse/bind shell. This can be mitigated by excluding a .phar file extension to be uploaded (like you did with .php .phtml .php5 etc). The vulnerability is patched in version 4.0.4.

Admidio es un sistema de administración de usuarios de código abierto y gratuito para sitios web de organizaciones y grupos. En Admidio versiones anteriores a 4.0.4, presenta un RCE autenticado por medio de la carga de archivos .phar. Puede ser cargado un shell web php por medio de la carga de la funcionalidad Documents & Files. Alguien con permisos de carga podría renombrar el shell php con una extensión .phar, visitar el archivo, desencadenando la carga útil para un shell reverse/bind. Esto puede ser mitigado al excluir una extensión de archivo .phar para cargar (como lo hizo con .php .phtml .php5, etc.). La vulnerabilidad está parcheada en versión 4.0.4

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-05-12 CVE Reserved
  • 2021-05-20 CVE Published
  • 2024-05-08 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-434: Unrestricted Upload of File with Dangerous Type
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Admidio
Search vendor "Admidio"
Admidio
Search vendor "Admidio" for product "Admidio"
< 4.0.4
Search vendor "Admidio" for product "Admidio" and version " < 4.0.4"
-
Affected