vendor:
VTENEXT 19 CE
by:
Marco Ruela
8.8
CVSS
HIGH
Remote Code Execution
352
CWE
Product Name: VTENEXT 19 CE
Affected Version From: 19 CE
Affected Version To: 19 CE
Patch Exists: YES
Related CWE: N/A
CPE: a:vtenext:vtenext:19_ce
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Ubuntu 16.04
2020
VTENEXT 19 CE – Remote Code Execution
This exploit uses a combination of three vulnerabilities to achieve Remote Code Execution. The first vulnerability is an XSS vulnerability in the 'From' field of the VTENEXT Messages module. The second vulnerability is a file upload vulnerability, where file extensions are checked against a $upload_badext in the config file, .pht extensions are allowed and executable by default. The third vulnerability is a CSRF vulnerability, where there are no CSRF protections in place. The exploit.js file needs to be hosted somewhere, IP's need to be replaced, check_csrf() should be changed based on the setup, and run_shell() is a 'nice to have'.
Mitigation:
Ensure that the 'From' field of the VTENEXT Messages module is not vulnerable to XSS attacks. Ensure that file extensions are checked against a $upload_badext in the config file, and that .pht extensions are not allowed and executable by default. Ensure that CSRF protections are in place.