Lucene search

K
huntrArgonx21B966C74D-6F3F-49FE-B40A-EAF25E362C56
HistoryAug 15, 2022 - 8:09 p.m.

Unrestricted File Upload Allowed due to Flawed Move File Functionality

2022-08-1520:09:29
argonx21
www.huntr.dev
12
misconfiguration
file upload
flawed functionality
security vulnerability
attacker
payload

EPSS

0.001

Percentile

21.4%

Description

Hello Team,

Hope you are doing good.

Due to misconfiguration in move file functionality an attacker could easily change the file extension of the uploaded malicious file disguised as .gcode file.

Steps:

1 . Upload a .gcode file & intercept the request as shown in the screenshots.
2 . Add malicious payload in the file content & keep file extension as .gcode.
3 . Now select the file & click on move button.
4 . Change the file extension to the html as shown in the screenshot & send the request.
5 . Copy the file download link & share it with the victim user. Once the file is opened payload will be executed.

Image POC

https://drive.google.com/drive/folders/1cbbJKiOqZdgIbGM3Bx09Xq6Xjkkje948?usp=sharing

EPSS

0.001

Percentile

21.4%

Related for B966C74D-6F3F-49FE-B40A-EAF25E362C56