Skip to content
Threat Feed
critical threat

OpenCATS 0.9.4 Remote Code Execution Vulnerability (CVE-2021-47936)

OpenCATS 0.9.4 is vulnerable to remote code execution (CVE-2021-47936) allowing unauthenticated attackers to execute arbitrary commands by uploading malicious PHP files disguised as resume attachments through the careers job application endpoint, leading to potential system compromise.

OpenCATS 0.9.4 contains a remote code execution vulnerability, identified as CVE-2021-47936, that allows unauthenticated attackers to execute arbitrary commands. The vulnerability stems from the application’s handling of resume attachments uploaded through the careers/job application endpoint. By disguising malicious PHP files as legitimate resumes, attackers can bypass upload restrictions and inject executable code into the server’s upload directory. Successful exploitation allows attackers to execute system commands via POST requests to the uploaded PHP file, potentially leading to full system compromise. This vulnerability poses a significant risk to organizations using OpenCATS 0.9.4, as it requires no authentication and can be exploited remotely.

Attack Chain

  1. An unauthenticated attacker accesses the careers/job application endpoint of an OpenCATS 0.9.4 instance.
  2. The attacker crafts a malicious PHP file containing the desired payload (e.g., a reverse shell or command execution).
  3. The attacker disguises the PHP file as a resume attachment (e.g., by changing the file extension or embedding it within a PDF).
  4. The attacker uploads the malicious file through the job application form.
  5. The OpenCATS application saves the uploaded file to the server’s upload directory (location varies based on configuration).
  6. The attacker identifies the location and filename of the uploaded file.
  7. The attacker sends a POST request to the uploaded PHP file, including the system commands to be executed in the request body.
  8. The server executes the commands specified in the POST request, enabling the attacker to achieve remote code execution.

Impact

Successful exploitation of CVE-2021-47936 allows unauthenticated attackers to execute arbitrary commands on the OpenCATS server. This can lead to complete system compromise, data theft, and denial of service. Given the nature of OpenCATS, a recruitment applicant tracking system, the impact includes exposure of sensitive applicant data. Since the exploit is unauthenticated, any OpenCATS 0.9.4 instance exposed to the internet is at risk.

Recommendation

  • Apply available patches or upgrade to a supported version of OpenCATS to remediate CVE-2021-47936.
  • Implement strict file type validation on all file upload endpoints, blocking the upload of executable files (e.g., PHP, ASP, JSP).
  • Monitor web server logs for suspicious POST requests targeting files in the upload directory as detected by the Sigma rule “Detect OpenCATS RCE via Resume Upload”.
  • Deploy the Sigma rules in this brief to your SIEM and tune for your environment.

Detection coverage 2

Detect OpenCATS RCE via Resume Upload

critical

Detects CVE-2021-47936 exploitation — HTTP POST requests to the uploads directory with a PHP file extension, indicating a potential RCE attempt in OpenCATS 0.9.4

sigma tactics: execution, initial_access techniques: T1190, T1505.003 sources: webserver

Detect OpenCATS Suspicious Upload Directory Access

medium

Detects access to the OpenCATS uploads directory which could indicate post-exploitation activity after a file upload vulnerability.

sigma tactics: execution, initial_access techniques: T1190 sources: webserver

Detection queries are available on the platform. Get full rules →