Skip to content

chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 

Repository files navigation

Jasmin ransomware web panel path traversal PoC

#EducationalPurposes
https://github.com/codesiddhant/Jasmin-Ransomware
I discovered a pre-auth path traversal vulnerability in the Jasmin Ransomware web panel (CVE-2024-30851), allowing an attacker to deanonymize panel operators and dump decryption keys. Jasmin ransomware was observed in a recent TeamCity (CVE-2024-27198, CVE-2024-27199) exploitation campaign (https://twitter.com/brody_n77/status/1765145148227555826)

Screencast.from.2024-04-04.18-51-07.webm

Execution after redirect (CWE-698)

The affected endpoint (Jasmin-Ransomware/Web Panel/download_file.php) fails to die() after sending the Location header. This allows an attacker to bypass authentication requirements. The call to readfile is unsanitized allowing an attacker to read arbitrary files.

<?php
session_start();
if(!isset($_SESSION['username']) ){
	header("Location: login.php");
}
$file=$_GET['file'];
if(!empty($file)){
    // Define headers
    header("Cache-Control: public");
    header("Content-Description: File Transfer");
    header("Content-Disposition: attachment; filename=$file");
    header("Content-Type: text/encoded");
    header("Content-Transfer-Encoding: binary");
    
    // Read the file
   readfile($file);

There is also a bunch of SQLi, one of them is exploited to bypass the login and obtain the filenames of decryption keys

About

Jasmin ransomware web panel path traversal PoC

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages