You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
LimeSurvey is a widely used open-source online survey system. In version v6.3.0-231016, an input validation vulnerability has been identified, allowing attackers to exploit a vulnerability in surveys containing "file upload" options. This can lead to a denial of service by preventing administrators from accessing statistical results of affected surveys.
Details
The vulnerability is associated with surveys published by administrators that include the "file upload" option. During the survey submission process, users can upload files, and the system validates the size of uploaded files. However, in version v6.3.0-231016, proper input validation is not performed on the uploaded file size, enabling attackers to manipulate submitted data to bypass the expected handling of the system.
Specifically, attackers can manipulate the submitted data and set the "size" parameter to a non-integer value, such as a string. Due to the lack of appropriate input validation, the system fails to handle this non-integer value correctly, resulting in an error. This error renders administrators unable to access statistical results for the affected survey, as the system fails to correctly parse the input data.
Reproduction
Log in to the administrator account.
Create a survey containing the "file upload" option. For Examples: 949614.
During the survey submission process, use manipulated data to set the "size" parameter to a non-integer value. [No permissions are required]
Open http://192.168.160.130/index.php/responses/browse?surveyId=135964 The administrator is unable to open all statistical data for this questionnaire and prompts: Error code 500: Internal server error round(): Argument #1 ($num) must be of type int|float, string given.
Impact
Attackers can leverage this vulnerability to execute a denial-of-service attack, obstructing administrators from accessing statistical results of the affected survey. This disruption may lead to interrupted data analysis, impacting the effectiveness and availability of the survey.
Summary
LimeSurvey is a widely used open-source online survey system. In version v6.3.0-231016, an input validation vulnerability has been identified, allowing attackers to exploit a vulnerability in surveys containing "file upload" options. This can lead to a denial of service by preventing administrators from accessing statistical results of affected surveys.
Details
The vulnerability is associated with surveys published by administrators that include the "file upload" option. During the survey submission process, users can upload files, and the system validates the size of uploaded files. However, in version v6.3.0-231016, proper input validation is not performed on the uploaded file size, enabling attackers to manipulate submitted data to bypass the expected handling of the system.
Specifically, attackers can manipulate the submitted data and set the "size" parameter to a non-integer value, such as a string. Due to the lack of appropriate input validation, the system fails to handle this non-integer value correctly, resulting in an error. This error renders administrators unable to access statistical results for the affected survey, as the system fails to correctly parse the input data.
Reproduction
POC
Open http://192.168.160.130/index.php/responses/browse?surveyId=135964 The administrator is unable to open all statistical data for this questionnaire and prompts: Error code 500: Internal server error round(): Argument #1 ($num) must be of type int|float, string given.
Impact
Attackers can leverage this vulnerability to execute a denial-of-service attack, obstructing administrators from accessing statistical results of the affected survey. This disruption may lead to interrupted data analysis, impacting the effectiveness and availability of the survey.
Note
References from https://huntr.com/bounties/6636038f-5cc7-4f87-8a50-922d139d6485
Since the manufacturer did not apply for a CVE number for this vulnerability as required, I will apply for it myself.
The text was updated successfully, but these errors were encountered: