Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03Z2M0LXI1anItOWh4ds4AAvim
Gin-vue-admin subject to Remote Code Execution via file upload vulnerability
Impact
Gin-vue-admin < 2.5.4 has File upload vulnerabilities。
File upload vulnerabilities are when a web server allows users to upload files to its filesystem without sufficiently validating things like their name, type, contents, or size. Failing to properly enforce restrictions on these could mean that even a basic image upload function can be used to upload arbitrary and potentially dangerous files instead. This could even include server-side script files that enable remote code execution.
Patches
https://github.com/flipped-aurora/gin-vue-admin/pull/1264
Workarounds
https://github.com/flipped-aurora/gin-vue-admin/pull/1264
References
#1263
For more information
The plugin installation function of Gin-Vue-Admin allows users to download zip packages from the plugin market and upload them for installation. This function has an arbitrary file upload vulnerability. A malicious attacker can upload a constructed zip package to traverse the directory and upload or overwrite arbitrary files on the server side.
The affected code https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/service/system/sys_auto_code.go line 880 called the utils.Unzip
method
paths, err := utils.Unzip(GVAPLUGPINATH+file.Filename, GVAPLUGPINATH)
paths = filterFile(paths)
var webIndex = -1
var serverIndex = -1
for i := range paths {
paths[i] = filepath.ToSlash(paths[i])
pathArr := strings.Split(paths[i], "/")
ln := len(pathArr)
if ln < 2 {
continue
}
if pathArr[ln-2] == "server" && pathArr[ln-1] == "plugin" {
serverIndex = i
}
if pathArr[ln-2] == "web" && pathArr[ln-1] == "plugin" {
webIndex = i
}
}
if webIndex == -1 && serverIndex == -1 {
zap.L().Error("非标准插件,请按照文档自动迁移使用")
return webIndex, serverIndex, errors.New("非标准插件,请按照文档自动迁移使用")
}
...
The https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/utils/zip.go code defines the utils.Unzip
method
//解压
func Unzip(zipFile string, destDir string) ([]string, error) {
zipReader, err := zip.OpenReader(zipFile)
var paths []string
if err != nil {
return []string{}, err
}
defer zipReader.Close()
for _, f := range zipReader.File {
fpath := filepath.Join(destDir, f.Name)
paths = append(paths, fpath)
if f.FileInfo().IsDir() {
os.MkdirAll(fpath, os.ModePerm)
...
It can be analyzed that after uploading a zip compressed file, the Unzip
method will be called to decompress the compressed file, and then judge whether the compressed file contains the fixed directory structure of server, web, and plugin.
Whether the zip file is correct or not, it will be decompressed first. If the directory does not exist, it will be created automatically. Therefore, malicious zip packages can be constructed, and directory traversal can be performed during automatic decompression to upload or overwrite any file.
Use the Zip Slip vulnerability to construct a malicious zip package with ../../../../
filenames, and upload the malicious zip package to trigger the vulnerability.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03Z2M0LXI1anItOWh4ds4AAvim
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 2 years ago
Updated: almost 2 years ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-7gc4-r5jr-9hxv, CVE-2022-39345
References:
- https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-7gc4-r5jr-9hxv
- https://nvd.nist.gov/vuln/detail/CVE-2022-39345
- https://github.com/flipped-aurora/gin-vue-admin/issues/1263
- https://github.com/flipped-aurora/gin-vue-admin/pull/1264
- https://github.com/flipped-aurora/gin-vue-admin/blob/main/server/service/system/sys_auto_code.go
- https://github.com/advisories/GHSA-7gc4-r5jr-9hxv
Blast Radius: 13.2
Affected Packages
go:github.com/flipped-aurora/gin-vue-admin/server
Dependent packages: 9Dependent repositories: 22
Downloads:
Affected Version Ranges: < 2.5.4
Fixed in: 2.5.4
All affected versions:
All unaffected versions: