CVE-2021-43829

7.4 HIGH

📋 TL;DR

CVE-2021-43829 is an unrestricted file upload vulnerability in PatrOwl Manager's findings import feature. Attackers can upload malicious files leading to cross-site scripting (XSS) and potential code injection. All PatrOwl Manager instances prior to version 1.7.7 are affected.

💻 Affected Systems

Products:
  • PatrOwl Manager
Versions: All versions prior to 1.7.7
Operating Systems: All platforms running PatrOwl Manager
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with findings import feature enabled are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete server compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Cross-site scripting attacks stealing session cookies, performing actions as authenticated users, and defacing the application.

🟢

If Mitigated

Limited impact with proper file validation and server hardening, though XSS may still affect users.

🌐 Internet-Facing: HIGH - Directly exploitable via web interface with potential for remote code execution.
🏢 Internal Only: HIGH - Even internal instances can be exploited by malicious insiders or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. Public proof-of-concept exists in advisory references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.7

Vendor Advisory: https://github.com/Patrowl/PatrowlManager/security/advisories/GHSA-5hc9-6hq4-2xfx

Restart Required: Yes

Instructions:

1. Backup current configuration and data. 2. Stop PatrOwl Manager service. 3. Update to version 1.7.7 via git pull or package update. 4. Restart PatrOwl Manager service. 5. Verify functionality.

🔧 Temporary Workarounds

Disable findings import feature

all

Temporarily disable the vulnerable findings import functionality until patching is possible.

# Modify PatrOwl Manager configuration to disable import features
# Check documentation for specific configuration options

🧯 If You Can't Patch

  • Implement strict web application firewall (WAF) rules to block file uploads with dangerous extensions
  • Restrict network access to PatrOwl Manager to only trusted IP addresses and users

🔍 How to Verify

Check if Vulnerable:

Check PatrOwl Manager version via web interface or configuration files. If version is below 1.7.7, system is vulnerable.

Check Version:

Check web interface or grep for version in configuration files: grep -r 'version' /path/to/patrowl/config/

Verify Fix Applied:

After updating, verify version is 1.7.7 or higher and test file upload functionality with restricted file types.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to findings import endpoint
  • Uploads with non-standard file extensions
  • Multiple failed upload attempts

Network Indicators:

  • HTTP POST requests to /findings/import endpoint with file uploads
  • Uploads of files with dangerous extensions (.php, .html, .js)

SIEM Query:

source="patrowl" AND (url="/findings/import" OR method="POST") AND file_extension IN ("php", "html", "js", "exe", "sh")

🔗 References

📤 Share & Export