You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Base64 path allows deletion of arbitrary files in media/file fields
Moderate
rhukster
published
GHSA-945r-cjfm-642cDec 10, 2020
Package
Grav Admin Plugin
(PHP)
Affected versions
1.9.17
Patched versions
1.9.18
Description
Impact
The impact of this issue that is any user with the ability to create or edit pages is able to also delete files from the file system. This can be done when deleting media from a page's content.
In the case of the request, a base64 String can be replaced with another one containing a path of a file on the system, that will subsequently be deleted.
Any files within the webroot are targetable and could be deleted to compromise the integrity of the application. Similarly, files outside of the webroot scope could be targeted with malicious intent.
Impact
The impact of this issue that is any user with the ability to create or edit pages is able to also delete files from the file system. This can be done when deleting media from a page's content.
In the case of the request, a base64 String can be replaced with another one containing a path of a file on the system, that will subsequently be deleted.
Any files within the webroot are targetable and could be deleted to compromise the integrity of the application. Similarly, files outside of the webroot scope could be targeted with malicious intent.
References
https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/11.1-Testing_for_Local_File_Inclusion
For more information
please contact [email protected]