CVE-2023-0048

Lack of Input Sanitation Lead to Remote Code Execution

Vulnerability Explanation

This vulnerability occur because there is no sanitation on user controlled input during the update configuration process. The input later, written to another .php file and this could lead to RCE.

Vulnerability Type

  • Code Injection

CVSS

Vendor

Affected Version

  • daloRADIUS <= 1.3

Proof of Concept

  1. Go to Config then go to Mail Settings

  2. Change the From Email Address value to malicious payload, e.g ';phpinfo();$a='x

  3. Go to config-mail.php or library/daloradius.conf.php to see executed code.

  4. Injected code in library/daloradius.conf.php can be seen in image below

  5. Executed code on config-mail.php can be seen in image below

  6. Executed code on library/daloradius.conf.php can be seen in image below

Exploit Code

# TBU

Tested On

  • daloRADIUS version: 1.3

Disclosure Timeline

  • 2023-01-04: Vulnerability discovered.

  • 2023-01-04: Vulnerability fixed.

  • 2023-01-04: Vulnerability reported to the MITRE corporation.

  • 2023-01-04: CVE has been assigned.

  • 2023-01-04: Public disclosure of the vulnerability.

Researcher

  • Achmad Zaenuri Dahlan Putra (kos0ng)

Additional Information

Last updated