Skip to content

Instantly share code, notes, and snippets.

@DylanGrl
Last active January 14, 2024 22:28
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save DylanGrl/4b4e0d53bb7626b2ab3f834ec5a2b23c to your computer and use it in GitHub Desktop.
Save DylanGrl/4b4e0d53bb7626b2ab3f834ec5a2b23c to your computer and use it in GitHub Desktop.
CVE-2022-39833 - PoC

CVE: CVE-2022-39833 - FileCloud RCE

Information

Product: FileCloud Version: (, 21.3.5.18513) - Tested on version 21.3.5.18513 CVSS : 9.1 - CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H Vulnerability: Remote Code Execution

Vulnerability Description :

Using the add Network Share feature, an admin is able to add a local folder instead of a remote one. Using this feature, the admin could mount the webserver root folder and thus access the integral code needed to run the application and modify it.

Steps to reproduce :

  1. From an administrator user, go to the Manage Network Folder location.

  2. Add a new folder and choose LAN.

  3. Choose a name.

  4. Pick normal mount point.

  5. Use /tmp as a mount point (Using webserver root here generate an error)

  6. Add a normal user as allowed user.

  7. Edit the Network Folder change the path for the path of the webserver root (/var/www/html for example) and click update.

  8. The Network Folder is now using the webserver root as an entry.

  9. Access the folder from the normal user and confirm the possiblity to update / delete and download all the contents from the webserver root.

10.From there, upload a PHP Shell and enjoy.

11.Sensitive information corresponding to the configuration could be retrieved as well.

Credit

GRILL Dylan

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment