Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pluck 4.7.15 - Zip Slip Vulnerability #100

Closed
naiagoesawoo opened this issue Apr 21, 2021 · 2 comments
Closed

Pluck 4.7.15 - Zip Slip Vulnerability #100

naiagoesawoo opened this issue Apr 21, 2021 · 2 comments

Comments

@naiagoesawoo
Copy link

Issue Summary
Pluck's module and theme installers are vulnerable to directory traversal (via zip slip).

Detailed Description
It is possible to upload a malicious zip file in order to traverse directories outside of the intended environment, potentially allowing arbitrary code execution which will run with the permissions of the user assigned to the webserver.

Reproduction Steps

  1. Using the evilarc tool, create a zip archive containing a PHP file with a depth of 2 (python evilarch.py shell.php -d 2 -f wolf.zip)
  2. Visit <pluck_domain>/admin.php?action=themeinstall and upload the malicious wolf.zip you created.
  3. Visit <pluck_domain>/shell.php and you now have a PHP shell.

Impact
This vulnerability makes remote code execution under the privileges of the user running the webserver application possible.

@BSteelooper
Copy link
Contributor

Could you perform a retest with the latest dev version?

@naiagoesawoo
Copy link
Author

I confirm the Zip Slip vulnerability has been fixed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants