Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2021-21425
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Unauthenticated Arbitrary YAML Write/Update leads to Code Execution
Source: NVD (National Vulnerability Database)
Vulnerability Description
Grav Admin Plugin is an HTML user interface that provides a way to configure Grav and create and modify pages. In versions 1.10.7 and earlier, an unauthenticated user can execute some methods of administrator controller without needing any credentials. Particular method execution will result in arbitrary YAML file creation or content change of existing YAML files on the system. Successfully exploitation of that vulnerability results in configuration changes, such as general site information change, custom scheduler job definition, etc. Due to the nature of the vulnerability, an adversary can change some part of the webpage, or hijack an administrator account, or execute operating system command under the context of the web-server user. This vulnerability is fixed in version 1.10.8. Blocking access to the `/admin` path from untrusted sources can be applied as a workaround.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
访问控制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Grav 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Grav是一套可扩展的用于个人博客、小型内容发布平台和单页产品展示的CMS(内容管理系统)。 Grav 存在安全漏洞,该漏洞源于未经身份验证的用户可以执行管理员控制器的一些方法,而不需要任何凭据。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
getgravgrav-plugin-admin <= 1.10.7 -
II. Public POCs for CVE-2021-21425
#POC DescriptionSource LinkShenlong Link
1GravCMS Unauthenticated Arbitrary YAML Write/Update leads to Code Execution (CVE-2021-21425)https://github.com/CsEnox/CVE-2021-21425POC Details
2It is a nmap script for GravCMS vulnerability (CVE-2021-21425)https://github.com/frknktlca/GravCMS_Nmap_ScriptPOC Details
3working exploit for the old cve-2021-21425 grav cms 1.7.10 vulnhttps://github.com/bluetoothStrawberry/cve-2021-21425POC Details
4It is a nmap script for GravCMS vulnerability (CVE-2021-21425)https://github.com/grey-master-a/GravCMS_Nmap_ScriptPOC Details
5Nonehttps://github.com/afifudinmtop/CVE-2021-21425POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2021-21425
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2021-21425

No comments yet


Leave a comment