document-merge-service vulnerable to Remote Code Execution via Server-Side Template Injection
Critical severity
GitHub Reviewed
Published
Jun 11, 2024
in
adfinis/document-merge-service
•
Updated Sep 30, 2024
Description
Published by the National Vulnerability Database
Jun 11, 2024
Published to the GitHub Advisory Database
Jun 11, 2024
Reviewed
Jun 11, 2024
Last updated
Sep 30, 2024
Impact
What kind of vulnerability is it? Who is impacted?
A remote code execution (RCE) via server-side template injection (SSTI) allows for user supplied code to be executed in the server's context where it is executed as the document-merge-server user with the UID 901 thus giving an attacker considerable control over the container.
Patches
Has the problem been patched? What versions should users upgrade to?
It has not been patched.
References
Are there any links users can visit to find out more?
POC
Add the following to a document, upload and render it:
The index might be different, so to debug this first render a template with
{{ PLACEHOLDER.__class__.__mro__[1].__subclasses__() }}
and then get the index ofsubprocess.Popen
and replace 202 with that.(note: the service would not run as root if configured correctly)
References