CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
9.0%
Timber is vulnerable to PHAR deserialization due to a lack of checking the input before passing it into the file_exists() function. If an attacker can upload files of any type to the server, he can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution especially when Timber is used with frameworks with documented POP chains like Wordpress/ vulnerable developer code.
The vulnerability lies in the run function within the toJpg.php file. The two parameters passed into it are not checked or sanitized, hence an attacker could potentially inject malicious input leading to Deserialization of Untrusted Data, allowing for remote code execution:
Setup the following code in /var/www/html: vuln.php represents our use of Timber functions and phar-poc.php represents code with a vulnerable POP chain.
As an attacker, we generate our PHAR payload using the following exploit script:
Generate with:
then change extension file from .phar to valid extension as svg,jpg,…
and execute vuln.php with php vuln.php, you should see whoami being executed:
This vulnerability is capable of remote code execution if Timber is used with frameworks or developer code with vulnerable POP chains.
Filter the phar:// protocol.
github.com/advisories/GHSA-6363-v5m4-fvq3
github.com/FriendsOfPHP/security-advisories/blob/master/timber/timber/CVE-2024-29800.yaml
github.com/timber/timber/commit/13c6b0f60346304f2eed4da1e0bb51566518de4a
github.com/timber/timber/issues/2971
github.com/timber/timber/security/advisories/GHSA-6363-v5m4-fvq3