Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-21425 PoC — Grav 安全漏洞

Source
Associated Vulnerability
Title:Grav 安全漏洞 (CVE-2021-21425)
Description:Grav是一套可扩展的用于个人博客、小型内容发布平台和单页产品展示的CMS(内容管理系统)。 Grav 存在安全漏洞,该漏洞源于未经身份验证的用户可以执行管理员控制器的一些方法,而不需要任何凭据。
Description
It is a nmap script for GravCMS vulnerability (CVE-2021-21425)
Readme
# GravCMS_Nmap_Script
It is a nmap script for GravCMS vulnerability (CVE-2021-21425)

USAGE

-- nmap -p443 --script grav_cms.nse <target>

-- PORT    STATE SERVICE

-- 443/tcp open  https

-- | grav_cms: 

-- |   VULNERABLE:

-- |   GravCMS (CVE-2021-21425)

-- |     State: VULNERABLE (Exploitable)

-- |     IDs:  CVE:CVE-2021-21425

-- |       GravCMS Unauthenticated Arbitrary YAML Write/Update leads to Code Execution

-- |     Disclosure date: 2021-03-19

-- |     References:

-- |       https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/

-- |_      https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21425
File Snapshot

[4.0K] /data/pocs/0385561fb9c8a60f426431292aca0ed9d835b6cc ├── [2.2K] GravCMS.nse └── [ 688] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.