Ulearn a5a7ca20de859051ea0470542844980a66dfc05d - RCE

Summary

NameUlearn a5a7ca20de859051ea0470542844980a66dfc05d - RCE
Code name
ProductUlearn
Affected versionsa5a7ca20de859051ea0470542844980a66dfc05d
StatePublic
Release date2023-04-10

Vulnerability

KindInsecure file upload
Rule
RemoteYes
CVSSv3.1 VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSSv3.1 Base Score9.1
Exploit availableNo
CVE ID(s)

Description

Ulearn version a5a7ca20de859051ea0470542844980a66dfc05d allows an attacker with administrator permissions to obtain remote code execution on the server through the image upload functionality. This occurs because the application does not validate that the uploaded image is actually an image.

Vulnerability

This vulnerability This occurs because the application does not validate that the uploaded image is actually an image.

Evidence of exploitation

To exploit this vulnerability, we only need to send the following malicious PHP code to the server.

rce-ulearn

Our security policy

We have reserved the ID CVE-2023-0670 to refer to this issue from now on.

System Information

  • Version: Ulearn a5a7ca20de859051ea0470542844980a66dfc05d

  • Operating System: GNU/Linux

Mitigation

There is currently no patch available for this vulnerability.

Credits

The vulnerability was discovered by Carlos Bello from Fluid Attacks' Offensive Team.

References

Vendor page https://github.com/ulearnpro/ulearn/

Timeline

Time-lapse-logo

2023-02-03

Vulnerability discovered.

Time-lapse-logo

2023-02-03

Vendor contacted.

Time-lapse-logo

2023-02-03

Vendor replied acknowledging the report.

Time-lapse-logo

2023-04-10

Public Disclosure.

Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.