7.5
CVSSv2

CVE-2021-32682

Published: 14/06/2021 Updated: 09/11/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an malicious user to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

std42 elfinder

Github Repositories

elFinder Commands Injection (CVE-2021-32682)

elFinder ZIP Arguments Injection Leads to Commands Injection (CVE-2021-32682) Some POCs for CVE-2021-32682 Usage Since the vulnerability is a command injection we can write a web shell to a php file This relies on if the server executes php Create file 1txt Right-click 'Create archive' -> 'Zip archive' Rename archive to '2zip' Ex