You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
User input passed through the "image_temp" parameter is not properly sanitized before being used in a call to the unlink() function at lines 162 and 192. This can be exploited to carry out Path Traversal attacks and delete arbitrary files in the context of the web server process.
NOTE: before being deleted, the file will be copied into the /uploads/imagemanager/logos/ directory. As such, by firstly deleting the index.html file in that directory, it might be possible to disclose the content of arbitrary files in case the web server allows for directory listing.
ImpressCMS branch :
The vulnerability has been tested and confirmed on ImpressCMS version 1.4.2 (the latest at the time of writing).
Steps To Reproduce:
Login into the application as any user (this should work both for Webmasters and Registered Users)
Go to: http://[impresscms]/libraries/image-editor/image-edit.php?op=save&image_id=1&image_temp=../../../mainfile.php
The mainfile.php script will be deleted, rendering the website unusable
Impact
This vulnerability might allow authenticated attackers to delete arbitrary files, potentially leading to a Denial of Service (DoS) condition or destruction of users data.
The text was updated successfully, but these errors were encountered:
Link: https://hackerone.com/reports/1081878
Date: 2021-01-19 21:18:41 UTC
By: egix
Weakness: Path Traversal
Details:
Summary:
The vulnerability is located in the
/libraries/image-editor/image-edit.php
script:User input passed through the "image_temp" parameter is not properly sanitized before being used in a call to the
unlink()
function at lines 162 and 192. This can be exploited to carry out Path Traversal attacks and delete arbitrary files in the context of the web server process.NOTE: before being deleted, the file will be copied into the
/uploads/imagemanager/logos/
directory. As such, by firstly deleting theindex.html
file in that directory, it might be possible to disclose the content of arbitrary files in case the web server allows for directory listing.ImpressCMS branch :
The vulnerability has been tested and confirmed on ImpressCMS version 1.4.2 (the latest at the time of writing).
Steps To Reproduce:
http://[impresscms]/libraries/image-editor/image-edit.php?op=save&image_id=1&image_temp=../../../mainfile.php
mainfile.php
script will be deleted, rendering the website unusableImpact
This vulnerability might allow authenticated attackers to delete arbitrary files, potentially leading to a Denial of Service (DoS) condition or destruction of users data.
The text was updated successfully, but these errors were encountered: