CVE-2023-0046

Unrestricted Logging Filename Lead to Remote Code Execution

Vulnerability Explanation

This vulnerability occur because there is no filename restriction or validation during file logging saving process. In this case attacker can set the filename to existing php file and append php code on it by manipulating the logged input.

Vulnerability Type

  • Code Injection

CVSS

Vendor

Affected Version

  • daloRADIUS <= 1.3

Proof of Concept

  1. Log in using operator account, in this case i try to login using operator1 user which is account that i created with ACL Settings only rep_online enabled

  2. Go to config and click on logging settings. Modify filename to any php file that accessible , e.g update.php then enabled Logging of Queries.

  3. Go to rep_online feature and fill the username with php code, e.g phpinfo()

  4. Go to update.php and you will see that phpinfo() successfully injected

Exploit Code

# TBU

Tested On

  • daloRADIUS version: 1.3

Disclosure Timeline

  • 2023-01-03: Vulnerability discovered.

  • 2023-01-04: Vulnerability fixed.

  • 2023-01-04: Vulnerability reported to the MITRE corporation.

  • 2023-01-04: CVE has been assigned.

  • 2023-01-04: Public disclosure of the vulnerability.

Researcher

  • Achmad Zaenuri Dahlan Putra (kos0ng)

Additional Information

Last updated