.. / CVE-2023-41892

Exploit for CraftCMS < 4.4.15 - Unauthenticated Remote Code Execution (CVE-2023-41892)

Description:

Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector leading to Remote Code Execution (RCE). Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.

Proof of Concept

PoC exploit

Nuclei Template

View the template here CVE-2023-41892.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-41892.yaml
Copy

Try the exploit in a lab environment:

Lab Machine Link
Hack The Box Surveillance Go to Practice

References:

https://nvd.nist.gov/vuln/detail/CVE-2023-41892
https://github.com/craftcms/cms/commit/a270b928f3d34ad3bd953b81c304424edd57355e
https://github.com/craftcms/cms/commit/7359d18d46389ffac86c2af1e0cd59e37c298857
https://blog.calif.io/p/craftcms-rce
https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#4415---2023-07-03-critical
https://github.com/craftcms/cms/security/advisories/GHSA-4w8r-3xrw-v25g