[CVE-2021–28379] Abusing file uploads to get an SSH backdoor
好的,我现在要帮用户总结这篇文章的内容。用户的要求是用中文总结,控制在100字以内,不需要特定的开头,直接写描述即可。 首先,我需要通读文章内容。文章主要讲的是作者在研究VestaCP的安全漏洞时的过程。他查看了上传功能的代码,发现可能存在安全问题。具体来说,他分析了UploadHandler.php中的构造函数,推测上传处理可能存在问题。 接下来,我要提取关键信息:目标是VestaCP,研究的是上传功能的代码,发现了潜在的安全漏洞。这些是主要内容点。 然后,我需要将这些信息浓缩到100字以内。要确保语言简洁明了,直接描述文章内容。 最后,检查是否符合用户的所有要求:中文、100字以内、没有特定开头。确认无误后就可以给出总结了。 </think> 作者研究了VestaCP的上传功能代码,发现其使用UploadHandler类处理文件上传,并推测该类构造函数可能存在安全漏洞。 2026-1-26 09:12:23 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Fady Othman

Free Link

Note: To fully understand the exploit you will need to fully understand how ssh keys are setup, so you will need to read this article.

I was looking at the scope for SSD Secure Disclosure and I noticed one of the targets is VestaCP, I decided to take a look at the source code to see if I would be able to find anything interesting.

I started by looking at the upload functionality as it’s often misused and usually have security issues, the source code for VestaCP can be found Here.

To install VestaCP follow the instructions at https://vestacp.com/install/ on an Ubuntu VM.

The upload functionality is implemented under /web/upload let's take a look at the index.php file to see how it's implemented.

<?php /* * jQuery File Upload Plugin PHP Example 5.14 * https://github.com/blueimp/jQuery-File-Upload * * Copyright 2010, Sebastian Tschan * https://blueimp.net * * Licensed under the MIT license: * http://www.opensource.org/licenses/MIT */ error_reporting(E_ALL | E_STRICT); require('UploadHandler.php'); $upload_handler = new UploadHandler();

As seen in the above code all what the code does is creating an instance of the UploadHandler class this probably means that the class constructor should handle the upload process, so let's take a look at the constructor of that class, the class is implemented in /web/upload/UploadHandler.php file, at the beginning of…


文章来源: https://infosecwriteups.com/cve-2021-28379-abusing-file-uploads-to-get-an-ssh-backdoor-77fdcef4d971?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh