Pulling the safety mat out from under you
3r3-300. I attended the Messaging, Malware and Mobile Anti-Abuse Working Group meeting (m3aawg.org) in Brooklyn, New York. I expected the best weather to wander around the city, enjoy the conference, and a wide selection of food in the area. I was so sure of the clearness of the sky that I didn’t even take anything from the rain with me. And it rained all week. This forced me to stay in my hotel room with free WiFi and my working laptop. I decided to spend this time researching Node.js and their companion packages, available on 3r335. https://www.npmjs.com
3r3-300. There are thousands of packages from users available for download and installation into your project. I searched NPM for popular package names such as file, backup, download, or upload. The last search query showed me a project called 3r3111. jQuery file upload
from user blueimp. His description seemed interesting enough to download and explore it.
3r314. 3r3118. 3r3102.
3r318. File upload widget for jQuery, with support for multiple file selection, drag & drop, progress indicator, validation and preview of images, audio and video. It supports cross-domain requests, a partial and renewable mechanism for downloading files with resize images on the client side. It works in any server platform (PHP, Python, Ruby on Rails, Java, Node.js, Go, etc.), which supports standard file upload via an HTML form.
3r3-300. I started looking at the source of the package and focused my attention on a couple of PHP files in the server /php directory. The files were called upload.php and UploadHandler.php. upload.php called UploadHandler.php, where the main file upload code was located. I also noticed that the files were uploaded to the files /directory in the root of the web server. I wrote a simple command with curl and a primitive PHP script that confirmed to me that I can upload the file to the server and then use it to execute commands on the server.
$ curl -F "[email protected]" http://example.com/jQuery-File-Upload-???/server/php/index.php 3r3338. 3r3102.
3r3-300. Where the shell.php file contains:
3r3334. 3r3335. 3r3338. 3r3102.
3r3-300. Opening a page in the browser with the cmd = id parameter from the test server returned the id of the user who started the server process to me. I assumed that this vulnerability did not go unnoticed and a quick search on Google confirmed to me that other projects that used this code or its derivatives were vulnerable. There were also some videos showing how to attack similar software packages.
3r3-300. I notified the author of jQuery File Upload and began documenting what I found to assign a CVE number. Soon the next day, the somewhat embarrassed author replied to me, asking for more information, since he could not reproduce the vulnerability in his test environment.
3r3-300. After comparing our test configurations via email, we found that Apache developers have turned off support for .htaccess files since version ???. It turns out that it was made 3r350. to improve performance
so that the server does not have to check this file every time when it accesses the appropriate directory. Moreover, this change was also made for 3r3352. prevent users from overriding security settings
that have been configured on the server.
3r3-300. Thus, Apache had good intentions when disabling .htaccess, but their changes also put some developers and their projects at risk, in particular, if they were counting on the security settings made in .htaccess.
3r3-300. In the case of this library, in order to properly handle this situation and fix the CVE-2018-9206 file loading vulnerability, developer changed the code so so that it only allows image files to be uploaded.
This problem is more than one project
3r3-300. It is also worth noting here that due to changes in Apache, some of the ?800 other projects may be vulnerable to the problem with downloading files.
3r3-300. Most of these forks still carry the original vulnerability in their code. In some cases, the vulnerability remains even after the developer has edited the original Blueimp code to embed it in his project, so the projects are still vulnerable to my example of the attack with minor variations.
3r3-300. This means that if any of these projects is used in production, then it is vulnerable to the vulnerability of downloading a file and its subsequent execution. Discovering opportunities for data theft from applications, malware injection, deface, and other harm.
3r3-300. Unfortunately, there is no way to accurately determine how many projects forked from the original jQuery File Upload are still actively supported and apply changes made in the main project. It is also not possible to determine exactly where the forked projects are used in production, if any. Moreover, the old versions of the project were also vulnerable to problems with downloading files, up to 2010.
3r33939. Conclusion 3r3393. 3r3102.
3r3-300. The Internet relies on a variety of security mechanisms to keep our systems, data, and transactions safe and secure. If one of these mechanisms suddenly disappears, it could compromise the safety of users and developers who rely on it.
3r3-300. It would be a good idea for developers to look at the changes in the systems and libraries on which they base their project. In this article, the security mechanism that was removed by Apache affected not only the Blueimp Jquery file upload, but also all its forks and branches. The vulnerability has affected many projects that depend on it, ranging from stand-alone web applications and ending with plug-ins to WordPress and other CMS.
3r3116. The original bug report 3r3119.
3r3116. 3r33112. Record CVE-2018-9206
3r3116. 3r3117. An article on ZDNet 3r3118. 3r3119.
It may be interesting
Can I find someone to write my paper for me free? At our cheap for-pay academic help service with writers across all subjects. Discover more about us here. write a paper online free