Lucene search

K
attackerkbAttackerKBAKB:CA9335F6-B89E-4233-B4E4-8E3099AAEE8F
HistoryFeb 26, 2019 - 12:00 a.m.

elFinder Command Injection v<2.1.48

2019-02-2600:00:00
attackerkb.com
54

0.965 High

EPSS

Percentile

99.6%

elFinder is an open-source file manager available as a web application. A command injection vulnerability in the image handling functionality exists for versions prior to 2.1.48. This exploit requires that the exiftran utility be installed.

Recent assessments:

space-r7 at May 09, 2019 5:57pm UTC reported:

Details

The PHP component in the elFinder software allows unauthenticated users to upload and manipulate images.
While performing image manipulation on a JPEG, elFinder passes the file’s name unsanitized to a command line utility called exiftran.
By inserting arbitrary code into the JPEG’s file name, the code will get passed to the exiftran utility and be executed.

This exploit requires that exiftran be installed to work. If exiftran is not installed, then the software opts to use jpegtran,
which removes exploitability. Despite the caveat listed previously, this is still a valuable exploit.

Assessed Attacker Value: 3
Assessed Attacker Value: 3Assessed Attacker Value: 4