GithubHelp home page GithubHelp logo

Not Working exploit about cve-2022-23940 HOT 4 CLOSED

manuelz120 avatar manuelz120 commented on June 11, 2024 1
Not Working exploit

from cve-2022-23940.

Comments (4)

vovkarazov123 avatar vovkarazov123 commented on June 11, 2024 1

@manuelz120 Thanks you. Monolog/RCE2 really work. But can you say how work this vulner?
I set some logs:

    public function save($check_notify = false)
    {
        $b = isset($_POST['email_recipients']);
        $a = is_array($_POST['email_recipients']);
        file_put_contents("qweqwe.txt", "ISSET: ".$b." ISARRAY: ".$a."\n",FILE_APPEND);
        if (isset($_POST['email_recipients']) && is_array($_POST['email_recipients'])) {
                file_put_contents("qweqwe.txt", "IM HERE\n", FILE_APPEND);
            $this->email_recipients = base64_encode(serialize($_POST['email_recipients']));
        }

        return parent::save($check_notify);
    }

Variable 'a' not true fnd log message "IM HERE" not in my log file.

from cve-2022-23940.

manuelz120 avatar manuelz120 commented on June 11, 2024

Thanks for reporting. I just verified that the current payload is indeed not working against SuiteCRM 7.11.8.

The vulnerable code-path is still present, but the Monolog/RCE1 payload (generated from https://github.com/ambionics/phpggc) doesn't seem to work. Probably it's using a different version of Monolog and the required classes are not loaded. However, the Monolog/RCE2 payload seems to work for this version.

from cve-2022-23940.

manuelz120 avatar manuelz120 commented on June 11, 2024

@vovkarazov123 would you mind verifying if the payload from the suitecrm-7-11-8-poc branch works for your installation?

from cve-2022-23940.

manuelz120 avatar manuelz120 commented on June 11, 2024

@vovkarazov123 yes, for the exploit to work it's important that the code doesn't enter the if branch. It's a good sign that the second log is not triggered. Data is still saved through the parent::save function.

When the data is loaded the next time, it will unserialize the untrusted content within the email_recipients column, which triggers a RCE. So this is pretty much a standard deserialization exploit, as described for example here

from cve-2022-23940.

Related Issues (3)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.