|Title:||OSClass directory traversal vulnerability|
|Version:||2.3.5 and probably prior|
|Vulnerability type:||Directory traversal|
|Risk level:||2 / 3|
OSClass version 2.3.5 and probably below suffers from a directory traversal vulnerability that leads to arbitrary file upload and information disclosure.
The problem is in the modified version of combine.php.
combine.php is used to merge multiple files into one to speed up page loading and implements a cache for generated files.
It takes two get parameters: “files” which is a list of files to merge and “type” that specifies the type of returned file; as a security measure combine.php ensures that the requested files are in its same directory (including subdirs).
combine.php fails to sanityze “type” get parameter before passing it to fwrite/fread calls. This allows an attacker to specify an arbitrary cache dir.
1) Arbitrary file upload. If a user can publish items and OSClass is configured to preserve a copy of the original image (default) it is possible to put an arbitrary file (ie a malicious php script) under the www root so shell commands can be executed with the privileges of the webserver.
1. Take a php file and rename it .gif (not really needed since OSClass trusts mime type)
2. Upload that file as picture for a new item and get its name (is 5_small.jpg)
3. Change useragent of your browser to: “Mozilla/4.0 (compatible; MSIE 5.0” . (needed to disable gzip encoding in combine.php)
4. Use combine.php to move itself to oc-content/uploads
now we have a copy of combine.php placed into uploads dir (the same dir where our malicius php file has been uploaded)
5. Use uploads/combine.php to move 5_original.php to /remote.php
6. Run the uploaded php file
2) Information disclosure vulnerability. It is possible to download and arbitrary file (ie config.php) under the www root.
1. Change useragent of your browser to: “Mozilla/4.0 (compatible; MSIE 5.0” . (needed to disable gzip encoding)
2. Move combine.php into web root
3. Run combine to download config.php
upgrade to OSClass 2.3.6