Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-23394— Remote Code Execution (RCE)

CVSS 8.1 · High EPSS 76.85% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-23394

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Remote Code Execution (RCE)
Source: NVD (National Vulnerability Database)
Vulnerability Description
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
studio-42/elfinder 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
studio-42/elfinder是一个开源的web文件管理器。 Studio-42 Elfinder 中存在代码问题漏洞,该漏洞源于服务器在将.phar解析成php时发生错误。攻击者可通过该漏洞给引起代码远程执行。以下产品及型号会受到影响:Studio-42 Elfinder 2.1.58 之前版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-studio-42/elfinder unspecified ~ 2.1.58 -

II. Public POCs for CVE-2021-23394

#POC DescriptionSource LinkShenlong Link
1studio-42/elfinder before 2.1.58 contains a remote code execution caused by execution of PHP code in a .phar file, letting attackers execute arbitrary PHP code if the server parses .phar files as PHP, exploit requires server to parse .phar files as PHP. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-23394.yamlPOC Details
2Docker container to setup a vulnerable elfinder version on both nginx and apache servers. Can be used to test vulnerability POChttps://github.com/0xnemian/CVE-2021-23394POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-23394

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2021-23394

No comments yet


Leave a comment