Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Filename bypass leading to RCE #3458

Closed
Bingoyyj opened this issue Feb 20, 2022 · 2 comments
Closed

Filename bypass leading to RCE #3458

Bingoyyj opened this issue Feb 20, 2022 · 2 comments
Assignees

Comments

@Bingoyyj
Copy link

Describe the bug
Filename bypass leading to Remote Code Execution

To Reproduce
Steps to reproduce the behavior:

  1. Upload a file with a<?php phpinfo();?> named shell.php, Note: the letter 'a' at the beginning of the content cannot be omitted.
  2. Add two dots after the file name like this shell.php...
  3. The shell file is successfully uploaded by bypassing detection and can be accessed via files/shell.php.
  4. This vulnerability can only be exploited on windows systems.

Screenshots
image

Desktop (please complete the following information):

  • OS: Windows
@pun-private
Copy link

Hi there,

It did indeed create a shell.php file on the filesystem but the file is empty. Do you have the same problem ?

Elfinder version : 2.1.60

@nao-pon
Copy link
Member

nao-pon commented Mar 8, 2022

@Bingoyyj It seems that the Windows server treats it as if there is no dot at the end of the file name. However, the control with the extension doesn't seem to work, so I'll fix this.

@nao-pon nao-pon self-assigned this Mar 8, 2022
nao-pon added a commit to nao-pon/elFinder that referenced this issue Mar 9, 2022
…ws server

Windows servers do not allow "." (Dots) at the end of a file name.
@nao-pon nao-pon closed this as completed in 69be51e Mar 9, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants