Pydio Zoho Editor Directory Traversal and File Upload Vulnerabilities


Description   Craig Arendt has discovered two vulnerabilities in Pydio, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, and compromise a vulnerable system.
1) Input passed via the "name" parameter to /plugins/editor.zoho/agent/save_zoho.php (when "ajxp_action" is set to "get_file") is not properly sanitised before being used to download and delete files. This can be exploited to download or delete arbitrary files via directory traversal sequences.
2) Input passed via the "id" and "format" parameters to /plugins/editor.zoho/agent/save_zoho.php is not properly verified before being used to upload files inside the webroot. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script.
The vulnerabilities are confirmed in version 5.0.3. Prior versions may also be affected.
     
Vulnerable Products   Vulnerable Software:
Pydio (formerly AjaXplorer) 5.x
     
Solution   Update to version 5.0.4.
     
CVE   CVE-2013-6226
     
References   Pydio:
http://pyd.io/pydio-core-5-0-4/
Craig Arendt:
http://www.redfsec.com/CVE-2013-6226
http://www.redfsec.com/CVE-2013-6227
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2013-11-14 

 Target Type 
Server 

 Possible exploit 
Remote