Lucene search

K
huntrKos0ngC190E42A-4806-47AA-AA1E-FF5D6407E244
HistoryDec 29, 2022 - 1:05 p.m.

Local File Read through Improper Filename Validation

2022-12-2913:05:24
kos0ng
www.huntr.dev
11
vulnerability
file read
improper validation
path traversal
import function
export function
base64 encoded

0.0004 Low

EPSS

Percentile

9.0%

Description

This vulnerability occur because there is no filename validation on logo_image_login and logo_image_header on import and export function. Attacker can use path traversal payload to leak local file such as /etc/passwd or froxlor config file.

Proof of Concept

  1. Go to import function on “Settings”
  2. Modify filename on logo_image_login or logo_image_header with path traversal payload , e.g “…/…/…/…/…/etc/passwd?v=1672300384”
  3. After successfully imported, go to “Settings” and go to Export page
  4. Click Download/Export Settings, then leaked file will be on panel.logo_image_login.image_data key on json file in base64 encoded format

0.0004 Low

EPSS

Percentile

9.0%

Related for C190E42A-4806-47AA-AA1E-FF5D6407E244