8.5
CWE
22
Advisory Published
CVE Published
Updated

CVE-2024-52291: Craft has a Local File System Validation Bypass Leading to File Overwrite, Sensitive File Access, and Potential Code Execution

First published: Wed Nov 13 2024(Updated: )

### Summary A vulnerability in CraftCMS allows an attacker to bypass local file system validation by utilizing a double `file://` scheme (e.g., `file://file:////`). This enables the attacker to specify sensitive folders as the file system, leading to potential file overwriting through malicious uploads, unauthorized access to sensitive files, and, under certain conditions, remote code execution (RCE) via Server-Side Template Injection (SSTI) payloads. Note that this will only work if you have an authenticated administrator account with [allowAdminChanges enabled](https://craftcms.com/docs/5.x/reference/config/general.html#allowadminchanges). https://craftcms.com/knowledge-base/securing-craft#set-allowAdminChanges-to-false-in-production ### Details The issue lies in line 57 of `cms/src/helpers/FileHelper.php`, it only removes `file://` on the most left. It is trivial to bypass this sanitization by adding 2 `file://`, e.g. `file://file:////`. ```php public static function normalizePath($path, $ds = DIRECTORY_SEPARATOR): string { // Remove any file protocol wrappers $path = StringHelper::removeLeft($path, 'file://'); // Is this a UNC network share path? $isUnc = (str_starts_with($path, '//') || str_starts_with($path, '\\\\')); // Normalize the path $path = parent::normalizePath($path, $ds); // If it is UNC, add those slashes back in front if ($isUnc) { $path = $ds . $ds . ltrim($path, $ds); } return $path; } ``` ### PoC 1. Sign in with an admin account and navigate to `Settings → Assets`, then create a new volume. 2. n the Asset Filesystem section, create a new file system and set the Base Path to `file://file:////vendor`. Without the prefix, the selection fails. ![alt text](https://winslow1984.com/uploads/images/gallery/2024-09/1.png) With the double `file://` prefix, the selection succeeds. ![alt text](https://winslow1984.com/uploads/images/gallery/2024-09/2.png) 3. Access Assets from the left navigation bar, then upload a file into this volume. ![alt text](https://winslow1984.com/uploads/images/gallery/2024-09/3.png) 4. The file is successfully uploaded and stored in the sensitive folder specified (e.g., `/vendor`). ![alt text](https://winslow1984.com/uploads/images/gallery/2024-09/4.png) 5. SSTI payloads can be uploaded to `/templates` folder, though full code execution was not achieved during testing, some payloads were still successful, leading to sensitive information disclosure, among other potential impacts. ![alt text](https://winslow1984.com/uploads/images/gallery/2024-09/7306f23f208e8e8dff48d65a0dc02dc.png) ### Impact Attackers who compromise an admin account(The admin user is not equal to the server owner) can exploit this flaw to assign sensitive folders as the base path of the filesystem. For instance, if the path `/templates` is specified (e.g., `file://file:////var/www/html/templates`), the attacker could upload SSTI payloads. While CraftCMS includes strict SSTI input sanitization, RCE may still be possible if the attacker can craft a valid payload, as seen in similar vulnerabilities (e.g., [GHSA-44wr-rmwq-3phw](https://github.com/advisories/GHSA-44wr-rmwq-3phw)). Additionally, attackers can upload tampered files to overwrite critical web application files. By enabling public URLs for files in the specified filesystem, they can also retrieve sensitive files (e.g., configuration files from the local file system). Although the vulnerability is exploitable only in the authenticated users, configuration with `ALLOW_ADMIN_CHANGES=true`, there is still a potential security threat.

Credit: security-advisories@github.com security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
composer/craftcms/cms>=4.0.0-RC1<=4.12.4.1
4.12.5
composer/craftcms/cms>=5.0.0-RC1<=5.4.5.1
5.4.6
Craftcms Craft Cms>4.0.0<4.12.5
Craftcms Craft Cms>5.0.0<5.4.6
Craftcms Craft Cms=4.0.0-rc1
Craftcms Craft Cms=4.0.0-rc2
Craftcms Craft Cms=4.0.0-rc3
Craftcms Craft Cms=5.0.0-rc1

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203