CVE-2021-32172
📋 TL;DR
CVE-2021-32172 is a critical pre-authentication remote code execution vulnerability in Maian Cart v3.8's Elfinder plugin due to broken access control. Attackers can execute arbitrary code on affected systems without authentication. All Maian Cart v3.8 installations using the vulnerable Elfinder plugin are affected.
💻 Affected Systems
- Maian Cart
📦 What is this software?
Maian Cart by Maianscriptworld
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to execute arbitrary commands, steal sensitive data, install malware, pivot to other systems, and maintain persistent access.
Likely Case
Remote code execution leading to web server compromise, data exfiltration, defacement, and potential ransomware deployment.
If Mitigated
Limited impact with proper network segmentation, web application firewalls, and strict access controls preventing exploitation.
🎯 Exploit Status
Multiple public proof-of-concept exploits are available demonstrating trivial exploitation without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 3.9 or later
Vendor Advisory: https://www.maianscriptworld.co.uk/
Restart Required: No
Instructions:
1. Backup your current installation and database. 2. Download Maian Cart v3.9 or later from the official website. 3. Replace all files with the new version. 4. Verify the Elfinder plugin has been updated or removed.
🔧 Temporary Workarounds
Disable or Remove Elfinder Plugin
linuxRemove or disable the vulnerable Elfinder plugin to prevent exploitation.
rm -rf /path/to/maiancart/elfinder/
mv /path/to/maiancart/elfinder/ /path/to/maiancart/elfinder.disabled/
Web Application Firewall Rules
allImplement WAF rules to block requests to Elfinder endpoints.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the Maian Cart server from critical systems
- Deploy a web application firewall with rules specifically blocking Elfinder-related requests and file upload attempts
🔍 How to Verify
Check if Vulnerable:
Check if Maian Cart version is 3.8 by examining the admin panel or checking version files. Verify if the /elfinder/ directory exists and is accessible.
Check Version:
grep -r 'version' /path/to/maiancart/ | grep -i '3.8'
Verify Fix Applied:
Confirm Maian Cart version is 3.9 or later. Verify the Elfinder plugin has been updated or removed and test that RCE attempts are blocked.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /elfinder/ endpoints
- File upload attempts with PHP/executable extensions
- Commands like system(), exec(), shell_exec() in access logs
Network Indicators:
- HTTP requests to /elfinder/php/connector.minimal.php with file upload parameters
- Outbound connections from web server to unknown IPs post-exploitation
SIEM Query:
source="web_access.log" AND (uri_path="/elfinder/*" OR method="POST" AND uri_path CONTAINS "elfinder")
🔗 References
- http://packetstormsecurity.com/files/164445/Maian-Cart-3.8-Remote-Code-Execution.html
- https://dreyand.github.io/maian-cart-rce/
- https://github.com/DreyAnd/maian-cart-rce
- https://www.maianscriptworld.co.uk/
- http://packetstormsecurity.com/files/164445/Maian-Cart-3.8-Remote-Code-Execution.html
- https://dreyand.github.io/maian-cart-rce/
- https://github.com/DreyAnd/maian-cart-rce
- https://www.maianscriptworld.co.uk/