vendor:
ajaXplorer
by:
@_jazz______
7.5
CVSS
HIGH
Unauthenticated Arbitrary File Upload
22
CWE
Product Name: ajaXplorer
Affected Version From: ajaXplorer 5.0.3
Affected Version To: ajaXplorer 3.3.5
Patch Exists: YES
Related CWE: CVE-2013-6227
CPE: a:pydio:ajaxplorer:5.0.3, cpe:/a:pydio:ajaxplorer:3.3.5
Platforms Tested: Debian 9
2019
Unauthenticated Arbitrary File Upload Vulnerability In Pydio/AjaXplorer 5.0.3 – 3.3.5
This exploit allows an attacker to upload arbitrary files to any location on the server via directory traversal. The vulnerability exists in the save_zoho.php file, specifically in the handling of the 'format' and 'name' parameters. If the 'ajxp_action' parameter is not set, the exploit uploads the 'content' file to the specified location. If the 'ajxp_action' parameter is set to 'get_file', the exploit reads the file from the specified location and then deletes it. The exploit takes advantage of the lack of sanitization of the 'format' and 'name' parameters.
Mitigation:
To mitigate this vulnerability, it is recommended to update to ajaXplorer version 5.0.4 or later. Additionally, proper input validation and sanitization should be implemented to prevent directory traversal attacks.