Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pluck-4.7.10-dev2 admin background exists a remote command execution vulnerability in the management file interface. #83

Closed
Lilc1 opened this issue Oct 21, 2019 · 5 comments

Comments

@Lilc1
Copy link

Lilc1 commented Oct 21, 2019

Vulnerability location:
/data/inc/file.php line:42
image
If the file name is '.htaccess', the strpos function returns a result of 0.
Demo:
Upload these two files in the management file interface.
image
image

Access in /files/1.txt.
image
Successful execution.
Then upload attack code.
image
image
Successfully obtained the shell.
Poc:

.htaccess
<FilesMatch "1">
SetHandler application/x-httpd-php
</FilesMatch>
@Lilc1
Copy link
Author

Lilc1 commented Oct 21, 2019

You can upload these two files through the csrf vulnerability, even without logging in to the background.

@BSteelooper
Copy link
Contributor

Could you please test the latest dev release 4.7.10-dev4?
https://github.com/pluck-cms/pluck/releases/tag/4.7.10-dev4

@Lilc1
Copy link
Author

Lilc1 commented Oct 21, 2019

您能否测试最新的开发版本4.7.10-dev4?
https://github.com/pluck-cms/pluck/releases/tag/4.7.10-dev4

All right!

@BSteelooper
Copy link
Contributor

Have you retested with the latest dev version?

@Lilc1
Copy link
Author

Lilc1 commented May 1, 2020

Have you retested with the latest dev version?

Can you apply for a CVE ID for me? Steps: https://help.github.com/en/github/managing-security-vulnerabilities/publishing-a-security-advisory#requesting-a-cve-identification-number

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants