CVE-2023-0046
Unrestricted Logging Filename Lead to Remote Code Execution
Vulnerability Explanation
This vulnerability occur because there is no filename restriction or validation during file logging saving process. In this case attacker can set the filename to existing php file and append php code on it by manipulating the logged input.
Vulnerability Type
Code Injection
CVSS
Vendor
Affected Version
daloRADIUS <= 1.3
Proof of Concept
Log in using operator account, in this case i try to login using operator1 user which is account that i created with ACL Settings only rep_online enabled
Go to config and click on logging settings. Modify filename to any php file that accessible , e.g update.php then enabled
Logging of Queries
.
Go to rep_online feature and fill the
username
with php code, e.gphpinfo()
Go to update.php and you will see that
phpinfo()
successfully injected
Exploit Code
Tested On
daloRADIUS version: 1.3
Disclosure Timeline
2023-01-03: Vulnerability discovered.
2023-01-04: Vulnerability fixed.
2023-01-04: Vulnerability reported to the MITRE corporation.
2023-01-04: CVE has been assigned.
2023-01-04: Public disclosure of the vulnerability.
Researcher
Achmad Zaenuri Dahlan Putra (kos0ng)
Additional Information
Last updated