Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RCE exists in Ionize-V1.0.8.1 'install/class/Installer.php' file #L1035 #403

Closed
0verf1ow opened this issue Feb 24, 2022 · 1 comment
Closed

Comments

@0verf1ow
Copy link

The "Encryption Key" parameter of the installation page uri "/install/?step=user&lang=en" is not strictly filtered, and any string can be written to the "application/config/config.php" file, resulting in arbitrary code execution.

Vulnerability reason

write configuration file directly without filtering

Where the vulnerability occurs: https://github.com/ionize/ionize/blob/master/install/class/Installer.php#L1035

image-20220224170254593

Vulnerability Demo

When installing to user settings, the value of the Encryption Key will be written to the configuration file "application/config/config.php"

image-20220224165400539

payload:

111111111111111111111111';system($_GET['cmd']);//

Enter payload to submit

image-20220224165658726

Ok, the payload has been successfully written into

image-20220224165807718

try command execution

image-20220224165907729

Bugfix

Only letters and numbers are allowed, no other characters are allowed

@partikule
Copy link
Member

partikule commented Mar 31, 2022 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants