🔍
Notes
TwitterGithub
  • 👋Introduction
  • 📚Research
    • 2024
      • Malware Analysis: Wedding Invitation Scam
      • Android Reverse Engineering (Dynamic Class Loader and Native Library)
    • 2023
      • Reverse Engineering APK Built with Flutter
      • Reverse Engineering Application Protected with Pyarmor
      • Analyzing CVE-2021-22204 Based on Network Traffic (PCAP file)
      • Emulating Android Native Library using Qiling - Part 1
      • Machine Learning Model (XGBoost) Reverse Engineering
      • CVE-2021-2461
      • CVE-2022-31367
      • CVE-2023-0046
      • CVE-2023-0048
      • CVE-2023-0316
    • 2022
      • Attacking Non Avalanche AES (Custom AES Implementation)
      • Cracking CRC32 with Forward Polynomial Constant
      • Cheating Game Built with WASM
      • Reverse Engineering Game Boy
      • Partial Known Plaintext Attack on Custom 3DES
    • 2021
      • Reverse Engineering Erlang BEAM File
      • Reverse Engineering Approach on Python Bytecode with Development Version
Powered by GitBook
On this page
  • Vulnerability Explanation
  • Vulnerability Type
  • CVSS
  • Vendor
  • Affected Version
  • Proof of Concept
  • Exploit Code
  • Tested On
  • Disclosure Timeline
  • Researcher
  • Additional Information
  1. Research
  2. 2023

CVE-2023-0048

Lack of Input Sanitation Lead to Remote Code Execution

Last updated 1 year ago

Vulnerability Explanation

This vulnerability occur because there is no sanitation on user controlled input during the update configuration process. The input later, written to another .php file and this could lead to RCE.

Vulnerability Type

  • Code Injection

CVSS

  • (High)

Vendor

Affected Version

  • daloRADIUS <= 1.3

Proof of Concept

  1. Go to Config then go to Mail Settings

  2. Change the From Email Address value to malicious payload, e.g ';phpinfo();$a='x

  3. Go to config-mail.php or library/daloradius.conf.php to see executed code.

  4. Injected code in library/daloradius.conf.php can be seen in image below

  5. Executed code on config-mail.php can be seen in image below

  6. Executed code on library/daloradius.conf.php can be seen in image below

Exploit Code

# TBU

Tested On

  • daloRADIUS version: 1.3

Disclosure Timeline

  • 2023-01-04: Vulnerability discovered.

  • 2023-01-04: Vulnerability fixed.

  • 2023-01-04: Vulnerability reported to the MITRE corporation.

  • 2023-01-04: CVE has been assigned.

  • 2023-01-04: Public disclosure of the vulnerability.

Researcher

Additional Information

Achmad Zaenuri Dahlan Putra ()

📚
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
daloRADIUS
kos0ng
https://huntr.com/bounties/57abd666-4b9c-4f59-825d-1ec832153e79/
https://github.com/lirantal/daloradius/commit/3650eea7277a5c278063214a5b71dbd7d77fc5aa