Lucene search

K
htbridgeHigh-Tech BridgeHTB23258
HistoryMay 06, 2015 - 12:00 a.m.

Local PHP File Inclusion in ResourceSpace

2015-05-0600:00:00
High-Tech Bridge
www.htbridge.com
491

EPSS

0.013

Percentile

86.1%

High-Tech Bridge Security Research Lab discovered vulnerability in ResourceSpace, which can be exploited to include arbitrary local PHP file, execute PHP code, and compromise vulnerable web application and even entire web server on which the application is hosted.

The vulnerability exists due to the absence of filtration of the “defaultlanguage” HTTP GET parameter received from the user before including PHP file using the “include()” PHP function in “/pages/setup.php” script. The installation script “/pages/setup.php” remains on the system after installation by default and is remotely accessible to non-authenticated users.

A simple PoC below includes a local file “/tmp/file.php”:

http://[host]/pages/setup.php?defaultlanguage=…/…/…/…/…/tmp/file

EPSS

0.013

Percentile

86.1%