IBM Bigfix Platform 9.5.9.62 – Arbitrary File Upload
Any authenticated (even unprivileged) user can upload any file to any location on the server with root privileges. This results in code execution on underlying system with root privileges. The issue was found in the 'Apps > Software > Add Software' menu, where the user needs to choose the upload via URL option as only this one is vulnerable. The URL needs to point to the attacker's web server where they host, for example, script files. When the form is submitted, the 'urlFileName' parameter is vulnerable to path traversal. This parameter specifies the temporary file name that will be used on the system. Then the application moves this file to another location that is not controlled by the application user. An attacker can, for example, upload a script file on the web server and execute it by sending a GET request.