exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Collabtive 0.7.5 Shell Upload

Collabtive 0.7.5 Shell Upload
Posted Jun 6, 2012
Authored by Mark Hoopes

Collabtive versions 0.7.5 and below suffer from a remote shell upload vulnerability due to a failed MIME check that trusts a user supplied value.

tags | advisory, remote, shell
SHA-256 | 18f469d0f2b49ceb70fc06a6b77b09b20d1c1e3e4b77ca3586c105af96ba7d7c

Collabtive 0.7.5 Shell Upload

Change Mirror Download
TITLE: Arbitrary File Upload/Execution in Collabtive
DATE: 06-04-2012
PRODUCT: Collabtive Web-Based Project Management Software
(http://collabtive.o-dyn.de/)
VERSIONS: 0.7.5, 0.6.1 confirmed. All versions <= 0.7.5 probable
RESEARCHER: Mark Hoopes (xync@xync.org/)
ADDITIONAL INFORMATION:
http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html

Vulnerability:
During the upload of an avatar image for a Collabtive user, the
manageuser.php script checks the file type using the MIME type provided
in the POST request (via the $_FILES['userfile']['type'] variable)
rather than by extension. This MIME type can be spoofed via an
intercepting proxy or custom POST script allowing a malicious user to
upload an arbitrary file. This file will be placed in a predictable web
accessible path with an easily determined name. In most installations,
execution from this directory is not restricted which allows a remote
attacker to execute a PHP script uploaded this way with the privileges
of the web user.

Access to the avatar upload function is restricted to logged in users,
but because of Collabtive's design decisions in implementing OpenID
support, this is easily accomplished. If an unknown user supplies a
valid OpenID v1.0 URL as the username on the login page, Collabtive will
automatically create a new user based on the referenced credentials.
That new user is not authorized to access any projects, but is
authorized to upload an avatar image. This allows an attacker with no
other knowledge of the host site or its users to exploit the vulnerability.

Fix:
Upgrade to Collabtive v0.7.6 or greater

Workaround:
Disable script execution of the upload directory via .htaccess for
Apache or similar web servers. This should apply at minimum to the
/files/[template]/avatar directory but can safely be applied to the
entire /files directory.

Sample contents of the .htaccess file are:
Options -Indexes
Options -ExecCGI
AddHandler cgi-script .php .php3 .php4 .phtml .pl .py .jsp .asp .htm
.shtml .sh .cgi

Note 'AllowOverride Options AddHandler' or 'AllowOverride All' must be
enabled in the main httpd.conf file for this directory or inherited from
a parent directory.
See http://www.mysql-apache-php.com/fileupload-security.htm

Additional References:
http://xync.org/2012/06/04/Arbitrary-File-Upload-in-Collabtive.html

http://www.php.net/manual/en/features.file-upload.post-method.php see
comments for $_FILES['userfile']['type']


TIMELINE:
April 18, 2012 - Issue reported to developers
April 19, 2012 - Fix committed to Collabtive github
May 30, 2012 - Collabtive version 0.7.6 released w/ fix
June 4, 2012 - Vulnerability published
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close