exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

redaxscript 2.5.0 Code Execution

redaxscript 2.5.0 Code Execution
Posted Dec 10, 2015
Authored by Tim Coen | Site curesec.com

redaxscript version 2.5.0 suffers from a code execution vulnerability.

tags | exploit, code execution
SHA-256 | cf5470fd255fbe9de2b3a7762546247b2173f1d01d3fff8aaa9c994caabb0228

redaxscript 2.5.0 Code Execution

Change Mirror Download
Security Advisory - Curesec Research Team

1. Introduction

Affected Product: redaxscript 2.5.0
Fixed in: module has been removed in version 2.6.0
Fixed Version Link: n/a
Vendor Contact: info@redaxmedia.com
Vulnerability Type: Code Execution
Remote Exploitable: Yes
Reported to vendor: 10/02/2015
Disclosed to public: 12/02/2015
Release mode: Coordinated release
CVE: n/a
Credits Tim Coen of Curesec GmbH

2. Overview

CVSS

High 9.0 AV:N/AC:L/Au:S/C:C/I:C/A:C

Description

The module file_manager allows for file uploads, and uses exif_imagetype to
check the validity of the file.

By setting the first bytes of the uploaded file to that of a valid image type,
an attacker can easily bypass this check and thus upload files of dangerous
type.

It should be noted that only files with the name index.php will be executed, as
access to all other PHP files is forbidden by a htaccess file.

An account that has access to the module "File manager" is needed to exploit
this issue.

3. Code


/modules/file_manager/index.php
function file_manager_upload($directory = '')
{
$file = $_FILES['file']['tmp_name'];
$file_name = file_manager_clean_file_name($_FILES['file']['name']);
$file_size = $_FILES['file']['size'];

/* validate post */

if (function_exists('exif_imagetype'))
{
if (exif_imagetype($file) == '')
{
$error = l('file_type_limit', '_file_manager') . l('point');
}
}

4. Solution

To mitigate this issue please remove the file_manager module.

5. Report Timeline

10/02/2015 Informed Vendor about Issue
11/15/2015 Vendor removes affected module
12/02/2015 Disclosed to public


Blog Reference:
https://blog.curesec.com/article/blog/redaxscript-250-Code-Execution-116.html

--
blog: https://blog.curesec.com
tweet: https://twitter.com/curesec

Curesec GmbH
Curesec Research Team
Romain-Rolland-Str 14-24
13089 Berlin, Germany


Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    0 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close