🔍
Notes
TwitterGithub
  • 👋Introduction
  • 📚Research
    • 2024
      • Malware Analysis: Wedding Invitation Scam
      • Android Reverse Engineering (Dynamic Class Loader and Native Library)
    • 2023
      • Reverse Engineering APK Built with Flutter
      • Reverse Engineering Application Protected with Pyarmor
      • Analyzing CVE-2021-22204 Based on Network Traffic (PCAP file)
      • Emulating Android Native Library using Qiling - Part 1
      • Machine Learning Model (XGBoost) Reverse Engineering
      • CVE-2021-2461
      • CVE-2022-31367
      • CVE-2023-0046
      • CVE-2023-0048
      • CVE-2023-0316
    • 2022
      • Attacking Non Avalanche AES (Custom AES Implementation)
      • Cracking CRC32 with Forward Polynomial Constant
      • Cheating Game Built with WASM
      • Reverse Engineering Game Boy
      • Partial Known Plaintext Attack on Custom 3DES
    • 2021
      • Reverse Engineering Erlang BEAM File
      • Reverse Engineering Approach on Python Bytecode with Development Version
Powered by GitBook
On this page
  • Vulnerability Explanation
  • Vulnerability Type
  • CVSS
  • Vendor
  • Affected Version
  • Proof of Concept
  • Exploit Code
  • Tested On
  • Disclosure Timeline
  • Researcher
  • Additional Information
  1. Research
  2. 2023

CVE-2023-0316

Local File Read through Improper Filename Validation

Last updated 1 year ago

Vulnerability Explanation

This vulnerability occur because there is no filename validation on logo_image_login and logo_image_header on import and export function. Attacker can use path traversal payload to read local file such as /etc/passwd or froxlor config file.

Vulnerability Type

  • Local File Read

CVSS

  • (Medium)

Vendor

Affected Version

  • froxlor version 0.10.38.3 until 2.x

Proof of Concept

  1. Go to import function on "Settings"

  2. Modify filename on logo_image_login or logo_image_header with path traversal payload , e.g "../../../../../etc/passwd?v=1672300384"

  3. After successfully imported file, go to "Settings" and go to Export page

  4. Click Download/Export Settings, then leaked file will be on panel.logo_image_login.image_data key on json file in base64 encoded format

Exploit Code

# TBU

Tested On

  • froxlor version: 2.0.0-beta1

Disclosure Timeline

  • 2022-12-29: Vulnerability discovered.

  • 2023-12-31: Vulnerability fixed.

  • 2023-01-14: Vulnerability reported to the MITRE corporation.

  • 2023-01-14: CVE has been assigned.

  • 2023-01-16: Public disclosure of the vulnerability.

Researcher

Additional Information

Achmad Zaenuri Dahlan Putra ()

📚
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
froxlor
kos0ng
https://huntr.com/bounties/c190e42a-4806-47aa-aa1e-ff5d6407e244/
https://github.com/froxlor/froxlor/commit/983d9294603925018225d672795bd8b4a526f41e