Closed Pyriphlegethon closed 5 years ago
Hi Pyriphlegethon, Thanks for reporting the issue. I added the session validation into save.php Please note that PatatasFritas is an old Fork of FruityWiFi (FruityWiFi is the original project) and it was forked before adding session validation into FruityWiFi.
regards
FruityWifi contains two security vulnerabilities that allow an unauthorized attacker to take complete control over the system.
The first vulnerability has already been released by another researcher and was assigned
CVE-2018-17317
:Now to exploit this vulnerability an attacker needs a valid session, but it turns out that command injection is also possible in a file that lacks any access control.
The file
www/modules/save.php
is accessible to anyone (erroneously?) and the validation attempt inregex_standard
can be bypassed. So a POST request tomodules/save.php
with amod_name
value ofa; netcat -lp 1234 < /etc/passwd; echo
will executenetcat -lp 1234 < /etc/passwd
.Even if the regex used in
regex_standard
were correct it would still be to lenient (because it allows-
and spaces).