Skip to Content

Arbitary File Upload Vulnerability in Elxis CMS component eForum v1.1


Posted by Michalis Nicolaou


           

Arbitary File Upload Vulnerability in Elxis CMS component eForum v1.1


Software:    eForum v1.1 (Elxis CMS component)

Vendor:    http://www.isopensource.com/

Vulnerability Type:    Arbitary File Upload

Remote:    Yes

Local:    No

Discovered:    09 March 2011

Reported:    06 April 2011

Fixed:    07 April 2011

Disclosed:    09 April 2011

Vendor's Response:    http://forum.elxis.org/index.php?topic=5144.msg39714#msg39714

VULNERABILITY DESCRIPTION:

The script ''/eforum.php'' is prone to an arbitrary file-upload vulnerability because it fails to properly filter dangerous file extensions.

An attacker can exploit this issue to upload an arbitrary remote file (e.g. .phtml) containing malicious PHP code and to execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system.

VULNERABILITY SUMMARY:

Form Name: eforumpostform

Form Action: http://host/path_to_elxis_cms/index2.php

Form Field Name: efattachment[]

Form Field Type: file

File Upload Location: http://host/path_to_elxis_cms/components/com_eforum/upload/

 

VULNERABILITY DETAILS:

Form Details:

Name: eforumpostform

Method: POST

Action: http://host/path_to_elxis_cms/index2.php


INDEXNAMETYPEVALUE
0titletextRe:Test Port
1iconselect 
2btncolorselect 
3messagetextareatest
4notifycheckbox1
5efattachment[]file/tmp/phpinfo.phtml
6eftplurlhiddenhttp://host/path_to_elxis_cms/components/com_eforum/template/blue
7optionhiddencom_eforum
8taskhiddensave
9bidhidden2
10parenthidden5
11idhidden0

Vulnerable Code:

File Location: /path_to_elxis_cms/components/com_eforum/

File Name: eforum.php

Code Snippet: = array('php', 'php3', 'php4', 'php5', 'exe', 'dll', 'so', 'htaccess');


Recommended Post