CVE-2021-32172

9.8 CRITICAL

📋 TL;DR

CVE-2021-32172 is a critical pre-authentication remote code execution vulnerability in Maian Cart v3.8's Elfinder plugin due to broken access control. Attackers can execute arbitrary code on affected systems without authentication. All Maian Cart v3.8 installations using the vulnerable Elfinder plugin are affected.

💻 Affected Systems

Products:
  • Maian Cart
Versions: Version 3.8
Operating Systems: All operating systems running Maian Cart
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the Elfinder plugin which is included by default in Maian Cart v3.8 installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, steal sensitive data, install malware, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Remote code execution leading to web server compromise, data exfiltration, defacement, and potential ransomware deployment.

🟢

If Mitigated

Limited impact with proper network segmentation, web application firewalls, and strict access controls preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public proof-of-concept exploits are available demonstrating trivial exploitation without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.9 or later

Vendor Advisory: https://www.maianscriptworld.co.uk/

Restart Required: No

Instructions:

1. Backup your current installation and database. 2. Download Maian Cart v3.9 or later from the official website. 3. Replace all files with the new version. 4. Verify the Elfinder plugin has been updated or removed.

🔧 Temporary Workarounds

Disable or Remove Elfinder Plugin

linux

Remove or disable the vulnerable Elfinder plugin to prevent exploitation.

rm -rf /path/to/maiancart/elfinder/
mv /path/to/maiancart/elfinder/ /path/to/maiancart/elfinder.disabled/

Web Application Firewall Rules

all

Implement WAF rules to block requests to Elfinder endpoints.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Maian Cart server from critical systems
  • Deploy a web application firewall with rules specifically blocking Elfinder-related requests and file upload attempts

🔍 How to Verify

Check if Vulnerable:

Check if Maian Cart version is 3.8 by examining the admin panel or checking version files. Verify if the /elfinder/ directory exists and is accessible.

Check Version:

grep -r 'version' /path/to/maiancart/ | grep -i '3.8'

Verify Fix Applied:

Confirm Maian Cart version is 3.9 or later. Verify the Elfinder plugin has been updated or removed and test that RCE attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /elfinder/ endpoints
  • File upload attempts with PHP/executable extensions
  • Commands like system(), exec(), shell_exec() in access logs

Network Indicators:

  • HTTP requests to /elfinder/php/connector.minimal.php with file upload parameters
  • Outbound connections from web server to unknown IPs post-exploitation

SIEM Query:

source="web_access.log" AND (uri_path="/elfinder/*" OR method="POST" AND uri_path CONTAINS "elfinder")

🔗 References

📤 Share & Export