🔍
Notes
TwitterGithub
  • 👋Introduction
  • 📚Research
    • 2024
      • Malware Analysis: Wedding Invitation Scam
      • Android Reverse Engineering (Dynamic Class Loader and Native Library)
    • 2023
      • Reverse Engineering APK Built with Flutter
      • Reverse Engineering Application Protected with Pyarmor
      • Analyzing CVE-2021-22204 Based on Network Traffic (PCAP file)
      • Emulating Android Native Library using Qiling - Part 1
      • Machine Learning Model (XGBoost) Reverse Engineering
      • CVE-2021-2461
      • CVE-2022-31367
      • CVE-2023-0046
      • CVE-2023-0048
      • CVE-2023-0316
    • 2022
      • Attacking Non Avalanche AES (Custom AES Implementation)
      • Cracking CRC32 with Forward Polynomial Constant
      • Cheating Game Built with WASM
      • Reverse Engineering Game Boy
      • Partial Known Plaintext Attack on Custom 3DES
    • 2021
      • Reverse Engineering Erlang BEAM File
      • Reverse Engineering Approach on Python Bytecode with Development Version
Powered by GitBook
On this page
  • Vulnerability Explanation
  • Vulnerability Type
  • CVSS
  • Vendor
  • Affected Version
  • Proof of Concept
  • Exploit Code
  • Tested On
  • Disclosure Timeline
  • Researcher
  • Additional Information
  1. Research
  2. 2023

CVE-2023-0046

Unrestricted Logging Filename Lead to Remote Code Execution

Last updated 1 year ago

Vulnerability Explanation

This vulnerability occur because there is no filename restriction or validation during file logging saving process. In this case attacker can set the filename to existing php file and append php code on it by manipulating the logged input.

Vulnerability Type

  • Code Injection

CVSS

  • (High)

Vendor

Affected Version

  • daloRADIUS <= 1.3

Proof of Concept

  1. Log in using operator account, in this case i try to login using operator1 user which is account that i created with ACL Settings only rep_online enabled

  2. Go to config and click on logging settings. Modify filename to any php file that accessible , e.g update.php then enabled Logging of Queries.

  3. Go to rep_online feature and fill the username with php code, e.g phpinfo()

  4. Go to update.php and you will see that phpinfo() successfully injected

Exploit Code

# TBU

Tested On

  • daloRADIUS version: 1.3

Disclosure Timeline

  • 2023-01-03: Vulnerability discovered.

  • 2023-01-04: Vulnerability fixed.

  • 2023-01-04: Vulnerability reported to the MITRE corporation.

  • 2023-01-04: CVE has been assigned.

  • 2023-01-04: Public disclosure of the vulnerability.

Researcher

Additional Information

Achmad Zaenuri Dahlan Putra ()

📚
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
daloRADIUS
kos0ng
https://huntr.com/bounties/2214dc41-f283-4342-95b1-34a2f4fea943/
https://github.com/lirantal/daloradius/commit/2013c2d1231e99dac918247b69b198ded1f30a1c