제출 #131: nopCommerce up to 4.2.0 FileRoxyFilemanService.cs Arbitrary File Download/Upload정보

제목nopCommerce up to 4.2.0 FileRoxyFilemanService.cs Arbitrary File Download/Upload
설명A vulnerability, which was classified as critical, was found in nopCommerce up to 4.20. Affected is the upload and download functionalities of the file Libraries/Nop.Services/Media/RoxyFileman/FileRoxyFilemanService.cs. The manipulation of URL parameters "d" [directory] and "f" [file] leads to a Path Traversal vulnerability, which allow to read and write arbitrary files on the underlying server filesystem. The vulnerability can be further exploited to create a webshell on the server, achieving remote command execution on the server. CWE is classifying the issue as CWE-23. This is going to have an impact on confidentiality, integrity, and availability. The weakness was discovered by Alessandro Magnosi (d3adc0de) and Jun Woo Lee on 19/06/2019. This vulnerability still not have a CVE assigned. The exploitability is told to be not trivial. It is possible to launch the attack remotely. A single authentication is necessary for exploitation. Technical details are known, and a private exploit has been developed by Alessandro Magnosi (d3adc0de). There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product. But the issue has been solved from version 4.3.0.
원천⚠️ https://github.com/klezVirus/cves/tree/master/NopCommerce/Privilege%20Escalation%20via%20Plugin%20Upload
사용자
 Anonymous User
제출2019. 12. 06. PM 05:00 (6 연령 ago)
모더레이션2019. 12. 10. AM 08:56 (4 days later)
상태수락
VulDB 항목146825 [Nop Solution Ltd nopCommerce 4.2.0 켜짐 ASP.NET File Upload PluginController.cs Custom Plugin 권한 상승]
포인트들20

Do you want to use VulDB in your project?

Use the official API to access entries easily!