Path Traversal Leading to RCE, Directory Creation, and CSV File Leakage
The latest version of the software has a path traversal vulnerability in the user upload feature, leading to arbitrary file upload (potential RCE), arbitrary directory creation, and CSV file content leakage. The issue has not yet been patched.
Available publicly on Jun 24 2024
Threat Overview
The vulnerability arises from unsanitized input handling in multiple parts of the application. Specifically, the user upload feature allows for arbitrary file uploads due to improper sanitization of the user_name parameter. This can lead to remote code execution (RCE) if an attacker uploads a malicious file to a sensitive directory. Additionally, the application allows for arbitrary directory creation and file content leakage by manipulating user inputs, which can expose sensitive data and compromise the system's integrity.
Attack Scenario
An attacker creates a user with a name that includes an absolute path, such as '/etc/cron.d', and uploads a file containing a cron job configuration. This file is then executed by the system, leading to remote code execution. Alternatively, the attacker can manipulate user inputs to create arbitrary directories or read the first column of CSV files, exposing sensitive information.
Who is affected
Users of the latest version of the software who utilize the user upload feature or load templates are affected. This includes administrators and regular users who may inadvertently expose sensitive data or compromise the system's security.
Technical Report
Want more out of Sightline?
Sightline offers even more for premium customers
Go Premium
We have - related security advisories that are available with Sightline Premium.