Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-46398 PoC — FileBrowser 跨站请求伪造漏洞

Source
Associated Vulnerability
Title:FileBrowser 跨站请求伪造漏洞 (CVE-2021-46398)
Description:FileBrowser是开源的一款网页文件浏览器。提供指定目录下的文件管理界面,可用于上传、删除、预览、重命名和编辑您的文件。它允许创建多个用户,每个用户可以有自己的目录。它可以用作独立的应用程序或中间件。 FileBrowser 存在跨站请求伪造漏洞,该漏洞允许攻击者创建一个具有管理员权限的后门用户,并通过发送给受害者的恶意HTML网页访问文件系统。
Description
Chamilo LMS v1.11.14 was discovered to contain a zero click code injection vulnerability which allows attackers to execute arbitrary code via a crafted plugin. This vulnerability is triggered through user interaction with the attacker's profile page.
Readme
# CVE-2021-46398 Chamilo-LMS 1.11.14 RCE
Chamilo LMS v1.11.14 was discovered to contain a zero click code injection vulnerability which allows attackers to execute arbitrary code via a crafted plugin. This vulnerability is triggered through user interaction with the attacker's profile page.


* One-Click Technique:  An Attacker who has a student account can create a malicious web page or a malicious SVG image file and upload the file to the "My Productions" section of the student profile page, then he can copy the URL of that file and send it to the Chamilo Admin User. When the Admin user loads the file in his browser with an active chamilo session, in the background it will upload a plugin (.zip file) to chamilo. Then the attacker can simply navigate to /plugin/exploited-directory/ and execute malicious commands.


* "Zero Click" technique: In this case, the attacker abuses the "My Diplomas" feature and injects malicious javascript in it, and when the Admin visits the Attacker's (student) profile page or Portfolio, the malicious javascript gets executed and the malicious plugin gets uploaded to the server. After that, the attacker can simply navigate to /plugin/exploit/ directory and execute the shell.php script and execute arbitrary commands.

Advantages of this exploit: No need to upload a malicious file to /app/upload/users/ directory , No need to send a link or URL to the Admin. When the admin visits attacker's profile, the attacker gets the RCE ;-) .




https://user-images.githubusercontent.com/52229330/159543300-8ea0308b-b37b-4702-8e15-736173056ac7.mp4

File Snapshot

[4.0K] /data/pocs/107e3f9a28cddc380c85e44140723b4f099f5bfc ├── [ 11M] chamilo_csrf-rce_exploit.mp4 ├── [1.6K] README.md └── [1.7K] zero-click.ht 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.