9
CVSSv2

CVE-2021-3291

Published: 26/01/2021 Updated: 09/03/2021
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 802
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zen-cart zen cart 1.5.7b

Github Repositories

rebuild cve

CVE-2021-3291 rebuild cve

zencart_auth_rce_poc CVE-2021-3291 1-) login as admin 2-) get any modules edit page 3-) inspect element any true radiobox 4-) change true to true','MODULE_ORDER_TOTAL_TOTAL_STATUS'); echo `id`; // 5-) click update 6-) to trig command go again edit page CVE-2021-3291 cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2021-3291 POC exploiting refresh page zoom M