支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 91ff8e006dfc0fcdff03116bd25a7b7712d6849e

来源
关联漏洞
标题:CodeCanyon RISE Ultimate Project Manager 安全漏洞 (CVE-2025-3855)
Description:CodeCanyon RISE Ultimate Project Manager是美国CodeCanyon公司的一款项目管理和 CRM 软件。 CodeCanyon RISE Ultimate Project Manager 3.8.2版本存在安全漏洞,该漏洞源于文件/index.php/team_members/save_profile_image/对参数profile_image_file的资源标识符控制不当。
Description
CVE-2025-3855 - RISE Ultimate Project Manager - IDOR
介绍
# CVE-2025-3855 - RISE Ultimate Project Manager - IDOR

Security vulnerability: IDOR (Insecure Direct Object Reference)<br>
Affected Component: profile image upload endpoint, team_members controller<br>
Software: RISE - Ultimate Project Manager & CRM <br>
Vendor: codecanyon<br>
Version: 3.8.2<br>

CVE ORG : https://www.cve.org/CVERecord?id=CVE-2025-3855 <br>
NIST: https://nvd.nist.gov/vuln/detail/CVE-2025-3855 <br>
CVE DETAILS: https://www.cvedetails.com/cve/CVE-2025-3855 <br>

Describe the bug/issue:

A vulnerability was discovered in RISE - Ultimate Project Manager & CRM that allows an authenticated user to change the profile picture of any other user by exploiting an Insecure Direct Object Reference (IDOR) in the /index.php/team_members/save_profile_image/[user_id] endpoint. The application does not properly validate whether the authenticated user is authorized to update the specified user ID’s profile image, allowing unauthorized modification of user data. This flaw impacts data integrity and may lead to impersonation or disruption of user experience.

To Reproduce:


🧑‍💼 1. Authenticated Access to Profile Settings

An authenticated user navigates to the "My Profile" section of the application, where they are provided with an option to upload or update their profile image.

<img src="https://github.com/L4zyFox/RISE-Ultimate_Project_Manager_e_CRM/blob/main/01-upload.png">

📤 2. Interception of the Upload Request

Upon uploading a profile image, the request can be intercepted using a proxy tool such as Burp Suite. The request is a POST to the following endpoint:

``POST /index.php/team_members/save_profile_image/36``

Here, 36 corresponds to the authenticated user's numeric ID.

<img src="https://github.com/L4zyFox/RISE-Ultimate_Project_Manager_e_CRM/blob/main/02-Interc.png">

🔁 3. Exploiting the IDOR via User ID Manipulation

By changing the ID in the URL path to that of another valid user, for example:

``POST /index.php/team_members/save_profile_image/44``

The application processes the request and updates the profile picture of user ID 44, without performing any access control checks.

<img src="https://github.com/L4zyFox/RISE-Ultimate_Project_Manager_e_CRM/blob/main/03-edited-Interc.png">

🔐 4. Lack of Authorization Validation

The server-side implementation fails to validate whether the authenticated user is authorized to perform the action on the targeted user ID. As a result, any authenticated user can change the profile images of other users, impacting the integrity of user data and potentially leading to impersonation or user confusion.
文件快照

[4.0K] /data/pocs/91ff8e006dfc0fcdff03116bd25a7b7712d6849e ├── [ 58K] 01-upload.png ├── [ 58K] 02-Interc.png ├── [ 80K] 03-edited-Interc.png └── [2.6K] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。