7.2
CWE
74
Advisory Published
Advisory Published
Updated

CVE-2023-32679: Remote Code Execution via unrestricted file extension in Craft CMS

First published: Fri May 19 2023(Updated: )

### Summary Unrestricted file extension lead to a potential Remote Code Execution (Authenticated, ALLOW_ADMIN_CHANGES=true) ### Details #### Vulnerability Cause : If the name parameter value is not empty string('') in the View.php's doesTemplateExist() -> resolveTemplate() -> _resolveTemplateInternal() -> _resolveTemplate() function, it returns directly without extension verification, so that arbitrary extension files are rendered as twig templates (even if they are not extensions set in defaultTemplateExtensions = ['html', 'twig']) ```php /** * Searches for a template files, and returns the first match if there is one. * * @param string $basePath The base path to be looking in. * @param string $name The name of the template to be looking for. * @param bool $publicOnly Whether to only look for public templates (template paths that don’t start with the private template trigger). * @return string|null The matching file path, or `null`. */ private function _resolveTemplate(string $basePath, string $name, bool $publicOnly): ?string { // Normalize the path and name $basePath = FileHelper::normalizePath($basePath); $name = trim(FileHelper::normalizePath($name), '/'); // $name could be an empty string (e.g. to load the homepage template) if ($name !== '') { if ($publicOnly && preg_match(sprintf('/(^|\/)%s/', preg_quote($this->_privateTemplateTrigger, '/')), $name)) { return null; } // Maybe $name is already the full file path $testPath = $basePath . DIRECTORY_SEPARATOR . $name; if (is_file($testPath)) { return $testPath; } foreach ($this->_defaultTemplateExtensions as $extension) { $testPath = $basePath . DIRECTORY_SEPARATOR . $name . '.' . $extension; if (is_file($testPath)) { return $testPath; } } } foreach ($this->_indexTemplateFilenames as $filename) { foreach ($this->_defaultTemplateExtensions as $extension) { $testPath = $basePath . ($name !== '' ? DIRECTORY_SEPARATOR . $name : '') . DIRECTORY_SEPARATOR . $filename . '.' . $extension; if (is_file($testPath)) { return $testPath; } } } return null; } ``` When attacker with admin privileges on the DEV or Misconfigured STG, PROD, they can exploit this vulnerability to remote code execution **(ALLOW_ADMIN_CHANGES=true)** ### PoC **Step 1)** Create a new filesystem. **Base Path: /var/www/html/templates** ![1](https://user-images.githubusercontent.com/30969523/228049254-6c3a9897-c26a-46a5-96ad-41c7b769116a.png) **Step 2)** Create a new asset volume. **Asset Filesystem: template** ![2](https://user-images.githubusercontent.com/30969523/228049839-d2d42245-fa6e-4245-9fd2-967f1b9f4a74.png) **Step 3)** Upload poc file( .txt , .js , .json , etc ) with twig template rce payload ```twig {{'<pre>'}} {{1337*1337}} {{['cat /etc/passwd']|map('passthru')|join}} {{['id;pwd;ls -altr /']|map('passthru')|join}} ``` ![7](https://user-images.githubusercontent.com/30969523/228051307-623b78d0-4792-44ae-af0f-aff6b16f8d87.png) ![5](https://user-images.githubusercontent.com/30969523/228051064-cfaad338-3aff-4c4f-a177-9b42e473142b.png) **Step 4)** Create a new global set with template layout. The template filename is poc.js ![8](https://user-images.githubusercontent.com/30969523/228051430-365457eb-2a10-47a8-aed9-fb400e80c6d5.png) **Step 5)** When access global menu or /admin/global/test, poc.js is rendered as a template file and RCE confirmed ![9](https://user-images.githubusercontent.com/30969523/228053142-62a0f1ad-bbfa-4b8d-b6bd-28ed26c1cc18.png) **Step 6)** RCE can be confirmed on other menus(Entries, Categories) where the template file is loaded. ![10](https://user-images.githubusercontent.com/30969523/228054216-5dcd0c30-85bd-4603-84e5-944cfe9ad93c.png) ![11](https://user-images.githubusercontent.com/30969523/228054146-d5a3ceea-e13d-461a-bcd6-abf260761d62.png) **Poc Environment)** ALLOW_ADMIN_CHANGES=true, defaultTemplateExtensions=['html','twig'] ![0](https://user-images.githubusercontent.com/30969523/228054764-37d78cf5-5eca-442f-873a-99e6676b8173.png) ![13](https://user-images.githubusercontent.com/30969523/228054803-1a2c40b0-e515-46b3-a653-bb5ef1a287a2.png) ![14](https://user-images.githubusercontent.com/30969523/228054821-c7b0cfd6-126a-4722-846c-26d725af1a6a.png) ### Impact Take control of vulnerable systems, Data exfiltrations, Malware execution, Pivoting, etc. Additionally, there are 371 domains using CraftCMS exposed on Shodan, and among them, 33 servers have "stage" or "dev" included in their hostnames. although the vulnerability is exploitable only in the authenticated users, configuration with ALLOW_ADMIN_CHANGES=true, there is still a potential security threat (Remote Code Execution) ![2023-03-31 10 29 53](https://user-images.githubusercontent.com/30969523/229001176-4c235b2f-e1a3-4b96-965a-78f227546a12.png) ### Remediation Recommend taking measures by referring to https://github.com/craftcms/cms-ghsa-9f84-5wpf-3vcf/pull/1 ```php // Maybe $name is already the full file path $testPath = $basePath . DIRECTORY_SEPARATOR . $name; if (is_file($testPath)) { // Remedation: Verify template file extension, before return $fileExt = pathinfo($testPath, PATHINFO_EXTENSION); $isDisallowed = false; if (isset($fileExt)) { $isDisallowed = !in_array($fileExt, $this->_defaultTemplateExtensions); if($isDisallowed) { return null; } else { return $testPath; } } } ``` ![remediation](https://user-images.githubusercontent.com/30969523/228841202-43079754-0d9d-47fa-8ae3-ce5dd509796b.png)

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Craftcms Craft Cms>=4.0.0<4.4.6
composer/craftcms/cms>=4.0.0<4.4.6
4.4.6

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-32679?

    CVE-2023-32679 is a vulnerability in Craft CMS that allows for unrestricted file extensions, leading to remote code execution.

  • How does CVE-2023-32679 impact Craft CMS?

    CVE-2023-32679 allows an attacker to execute arbitrary code remotely by exploiting unrestricted file extensions in Craft CMS.

  • What is the severity of CVE-2023-32679?

    CVE-2023-32679 has a severity rating of 7.2 (High).

  • How can I fix CVE-2023-32679 in Craft CMS?

    To fix CVE-2023-32679, update Craft CMS to version 4.4.6 or newer.

  • Where can I find more information about CVE-2023-32679?

    You can find more information about CVE-2023-32679 in the Craft CMS security advisory at: https://github.com/craftcms/cms/security/advisories/GHSA-vqxf-r9ph-cc9c

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203