Arbitrary file upload in Laravel-Administrator package for Laravel



Published: 2020-04-07
Risk Medium
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2020-10963
CWE-ID CWE-434
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
Laravel-Administrator
Web applications / Modules and components for CMS

Vendor FrozenNode

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Arbitrary file upload

EUVDB-ID: #VU26641

Risk: Medium

CVSSv3.1: 6.8 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C]

CVE-ID: CVE-2020-10963

CWE-ID: CWE-434 - Unrestricted Upload of File with Dangerous Type

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to improper input validation. A remote administrator can upload and execute arbitrary file on the target system via "admin/tips_image/image/file_upload" image upload with PHP content within a GIF image that has the .php extension.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Laravel-Administrator: 1.2.0 - 5.0.12

External links

http://xavibel.com/2020/03/23/unrestricted-file-upload-in-frozennode-laravel-administrator/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###