File Upload Bypass Leads to Remote Code Execution (RCE) in cockpit-hq/cockpit
Valid
Reported on
Aug 5th 2023
Description
Vulnerable file upload functionality that users can upload files. Although almost all files with extensions like php, phtml, etc. have been prevented, an attacker can still upload phps files and remote code execute .
Condition
The Apache server which is hosting the web application need to have the ability to execute the phps file
Proof of Concept
- Link PoC: https://docs.google.com/document/d/1v-o_Uoqqwz6x8Wt9UDUHA0Q1aqakCexcvnwLl4rKdQ4/edit?usp=sharing
- Link video PoC: https://photos.app.goo.gl/zAySJVVHWo8fkXzY9
Impact
An attacker could use this vulnerability to get code execution on the victim machine
Occurrences
We are processing your report and will contact the
cockpit-hq/cockpit
team within 24 hours.
2 months ago
We have contacted a member of the
cockpit-hq/cockpit
team and are waiting to hear back
a month ago
The researcher's credibility has slightly increased as a result of the maintainer's thanks: +1
The researcher's credibility has increased: +7
Assets.php#L140-L192
has been validated
to join this conversation