CWE
284
Advisory Published
Updated

CVE-2021-21425: Unauthenticated Arbitrary YAML Write/Update leads to Code Execution

First published: Wed Apr 07 2021(Updated: )

Grav Admin Plugin is an HTML user interface that provides a way to configure Grav and create and modify pages. In versions 1.10.7 and earlier, an unauthenticated user can execute some methods of administrator controller without needing any credentials. Particular method execution will result in arbitrary YAML file creation or content change of existing YAML files on the system. Successfully exploitation of that vulnerability results in configuration changes, such as general site information change, custom scheduler job definition, etc. Due to the nature of the vulnerability, an adversary can change some part of the webpage, or hijack an administrator account, or execute operating system command under the context of the web-server user. This vulnerability is fixed in version 1.10.8. Blocking access to the `/admin` path from untrusted sources can be applied as a workaround.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Getgrav Grav-plugin-admin<1.10.8

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2021-21425?

    The severity of CVE-2021-21425 is critical.

  • How does CVE-2021-21425 affect Grav Admin Plugin?

    CVE-2021-21425 affects Grav Admin Plugin versions 1.10.7 and earlier.

  • What is the CWE ID of CVE-2021-21425?

    The CWE ID of CVE-2021-21425 is 284.

  • Is authentication required to exploit CVE-2021-21425?

    No, CVE-2021-21425 can be exploited by an unauthenticated user.

  • Are there any references available for CVE-2021-21425?

    Yes, you can find references for CVE-2021-21425 at the following links: [Packetstorm Security](http://packetstormsecurity.com/files/162283/GravCMS-1.10.7-Remote-Command-Execution.html) and [GitHub Advisory](https://github.com/getgrav/grav-plugin-admin/security/advisories/GHSA-6f53-6qgv-39pj).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203