CVE-2023-0048
Lack of Input Sanitation Lead to Remote Code Execution
Vulnerability Explanation
This vulnerability occur because there is no sanitation on user controlled input during the update configuration process. The input later, written to another .php file and this could lead to RCE.
Vulnerability Type
Code Injection
CVSS
Vendor
Affected Version
daloRADIUS <= 1.3
Proof of Concept
Go to Config then go to Mail Settings
Change the From Email Address value to malicious payload, e.g
';phpinfo();$a='x
Go to config-mail.php or library/daloradius.conf.php to see executed code.
Injected code in library/daloradius.conf.php can be seen in image below
Executed code on config-mail.php can be seen in image below
Executed code on library/daloradius.conf.php can be seen in image below
Exploit Code
Tested On
daloRADIUS version: 1.3
Disclosure Timeline
2023-01-04: Vulnerability discovered.
2023-01-04: Vulnerability fixed.
2023-01-04: Vulnerability reported to the MITRE corporation.
2023-01-04: CVE has been assigned.
2023-01-04: Public disclosure of the vulnerability.
Researcher
Achmad Zaenuri Dahlan Putra (kos0ng)
Additional Information
Last updated