CVE-2023-24249

admin 2024年3月27日23:48:53评论7 views字数 1466阅读4分53秒阅读模式

laravel-admin is administrative interface builder for laravel which can help you build CRUD backends just with few lines of code.

There is a problem in larravel-admin that allows attackers to bypass file upload restrictions, and attackers can upload files in *. php format for remote code execution.

Suggested description

An arbitrary file upload vulnerability in laravel-admin v1.8.19 allows attackers to execute arbitrary code via a crafted PHP file.

VulnerabilityType Other

File Upload

Vendor of Product

https://github.com/z-song/laravel-admin

Affected Product Code Base

laravel-admin - v1.8.19

Affected Component

There is a problem in larravel-admin that allows attackers to bypass file upload restrictions, and attackers can upload files in *. php format for remote code execution.

Attack Type

Remote

Impact Code execution

true

Details

After logging in to the larravel-admin background, going to the “user settings” (“用户设置”) interface, try to modify the user’s avatar and save it, and then capture the requested data packet.

You can try to upload a php file ending in. jpg extended
CVE-2023-24249
Try to modify avatar

CVE-2023-24249
Upload .jpg file

After the upload is successful, replay the request and modify the file name of the file upload to “. php”.

e.g.: php.jpg.php

CVE-2023-24249
Replay the request
CVE-2023-24249
Upload succeeded

Refresh the user setting interface, prompt that the upload was successful, and you can get the address of the php file below.
CVE-2023-24249
PHP file is executed

The vulnerability affects the latest version of laravel-admin (v1.8.19).

Others

CVE ID: CVE-2023-24249

Github: https://github.com/z-song/laravel-admin

Official website: https://laravel-admin.org/

Issues page: https://github.com/z-song/laravel-admin/issues/5726

- source:flyd.uk

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年3月27日23:48:53
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   CVE-2023-24249https://cn-sec.com/archives/2610236.html

发表评论

匿名网友 填写信息