forked from 1979139113/0day-today-exploits
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path10081.txt
46 lines (28 loc) · 1.57 KB
/
10081.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
Achievo 1.4.2 Arbitrary File Upload
===================================
Affected Applications: Confirmed in Achievo 1.4.2. Other versions may also be affected.
Severity: Medium – CVSS: 6.8 (AV:L/AC:L/Au:S/C:C/I:C/A:C)
Vendor Status: New release available (Achievo 1.4.3)
Vulnerability Description:
The vulnerability is caused due to an improper check in “Document Types†section under Setup menu,
allowing the upload of files with arbitrary extensions to a folder inside the Webroot. This can be
exploited to e.g. execute arbitrary PHP code by uploading a specially crafted PHP script containing
some kind of Web Shell.
Proof of Concept:
Select a file with any extension (including PHP) and upload it using the form. The file will be available
in:
http://server/modules/docmanager/doctypetemplates/myuploadedfile
For example, we can upload “cmd.php†in our instalation in localhost and execute it entering:
http://server/achievo-1.4.2/modules/docmanager/doctypetemplates/cmd.php
Impact:
Direct execution of arbitrary PHP code in the Web Server.
Solution:
Update the document manager and add a new config (docmanager_allowedfiletypes) for it in
/configs/docmanager.php.inc. With this config you can tell the docmanager what type of files a user can
upload.
Vendor Response:
2009-12-03 – Vulnerability was identified
2009-12-03 – Vendor contacted
2009-12-03 – Vendor confirmed vulnerability
2009-12-03 – Vendor released fixed version
2009-12-04 – Vulnerability published