CWE
22 352
Advisory Published
Updated

CVE-2019-11231: Path Traversal

First published: Wed May 22 2019(Updated: )

An issue was discovered in GetSimple CMS through 3.3.15. insufficient input sanitation in the theme-edit.php file allows upload of files with arbitrary content (PHP code, for example). This vulnerability is triggered by an authenticated user; however, authentication can be bypassed. According to the official documentation for installation step 10, an admin is required to upload all the files, including the .htaccess files, and run a health check. However, what is overlooked is that the Apache HTTP Server by default no longer enables the AllowOverride directive, leading to data/users/admin.xml password exposure. The passwords are hashed but this can be bypassed by starting with the data/other/authorization.xml API key. This allows one to target the session state, since they decided to roll their own implementation. The cookie_name is crafted information that can be leaked from the frontend (site name and version). If a someone leaks the API key and the admin username, then they can bypass authentication. To do so, they need to supply a cookie based on an SHA-1 computation of this known information. The vulnerability exists in the admin/theme-edit.php file. This file checks for forms submissions via POST requests, and for the csrf nonce. If the nonce sent is correct, then the file provided by the user is uploaded. There is a path traversal allowing write access outside the jailed themes directory root. Exploiting the traversal is not necessary because the .htaccess file is ignored. A contributing factor is that there isn't another check on the extension before saving the file, with the assumption that the parameter content is safe. This allows the creation of web accessible and executable files with arbitrary content.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Get-simple Getsimple Cms<=3.3.15

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2019-11231?

    CVE-2019-11231 is a vulnerability in GetSimple CMS through 3.3.15 that allows an authenticated user to upload files with arbitrary content, including PHP code.

  • How severe is CVE-2019-11231?

    CVE-2019-11231 has a severity rating of 9.8, which is considered critical.

  • How does CVE-2019-11231 affect GetSimple CMS?

    CVE-2019-11231 affects GetSimple CMS versions up to and including 3.3.15.

  • Can an attacker bypass authentication to exploit CVE-2019-11231?

    Yes, authentication can be bypassed to exploit CVE-2019-11231.

  • How can I mitigate the vulnerability in GetSimple CMS?

    To mitigate the vulnerability, update GetSimple CMS to a version higher than 3.3.15 or apply the necessary patches provided by the vendor.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203