pluck-cms / pluck

Central repo for pluck cms
http://www.pluck-cms.org
54 stars 37 forks source link

File upload vuln pluck 4.7.10 dev version #78

Closed zhangdebiao closed 5 years ago

zhangdebiao commented 5 years ago

An issue was discovered in Pluck before 4.7.10 dev version. Remote PHP code execution is possible. Do you hava a email? I send details to it.

BSteelooper commented 5 years ago

You can send all pluck exploits to pluck-exploits@bas.xosc.nl

zhangdebiao commented 5 years ago

Following are details of vulnerabilities in file upload Location: https://github.com/pluck-cms/pluck/blob/master/data/inc/files.php Code: 0 File upload only filters the suffixes'.php','php3','php4','php5','php6','php7','phtml', but ignores the'.pht'and'.phtm' files, while '.pht' and '.phtm' files can be parsed by Apache by default. Due to the inadequate filtering of file suffixes that prohibit uploading, an attacker can exploit this vulnerability to execute arbitrary code by uploading malicious files.

Step1. Upload a file phpinfo.pht.

File content: <?php phpinfo();?>
1
Upload Successful

Step2. Request

Malicious files are parsed as php, attacker can exploit this vulnerability to execute arbitrary code by uploading malicious files.
2

BSteelooper commented 5 years ago

I created a new release with a fix. can you check? pluck-4.7.10-dev1.tar.gz

zhangdebiao commented 5 years ago

The vulnerability in this version has been fixed.If find other vulns, I will tell you immediately.

------------------ 原始邮件 ------------------ 发件人: "Bas Steelooper"notifications@github.com; 发送时间: 2019年8月1日(星期四) 晚上6:27 收件人: "pluck-cms/pluck"pluck@noreply.github.com; 抄送: "你吃啥呢"843345000@qq.com;"State change"state_change@noreply.github.com; 主题: Re: [pluck-cms/pluck] File upload vuln pluck 4.7.10 dev version (#78)

I created a new release with a fix. can you check? pluck-4.7.10-dev1.tar.gz

— You are receiving this because you modified the open/close state. Reply to this email directly, view it on GitHub, or mute the thread.