CVE-2024-40645

FOG is a cloning/imaging/rescue suite/inventory management system. An improperly restricted file upload feature allows authenticated users to execute arbitrary code on the fogproject server. The Rebranding feature has a check on the client banner image requiring it to be 650 pixels wide and 120 pixels high. Apart from that, there are no checks on things like file extensions. This can be abused by appending a PHP webshell to the end of the image and changing the extension to anything the PHP web server will parse. This vulnerability is fixed in 1.5.10.41.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fogproject:fogproject:*:*:*:*:*:*:*:*

History

05 Sep 2024, 17:09

Type Values Removed Values Added
First Time Fogproject fogproject
Fogproject
CPE cpe:2.3:a:fogproject:fogproject:*:*:*:*:*:*:*:*
References () https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/packages/web/lib/pages/fogconfigurationpage.class.php#L2860-L2896 - () https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/packages/web/lib/pages/fogconfigurationpage.class.php#L2860-L2896 - Product
References () https://github.com/FOGProject/fogproject/commit/9469606a18bf8887740cceed6593a2e0380b5e0c - () https://github.com/FOGProject/fogproject/commit/9469606a18bf8887740cceed6593a2e0380b5e0c - Patch
References () https://github.com/FOGProject/fogproject/security/advisories/GHSA-59mq-q8g5-2f4f - () https://github.com/FOGProject/fogproject/security/advisories/GHSA-59mq-q8g5-2f4f - Exploit

01 Aug 2024, 12:42

Type Values Removed Values Added
Summary
  • (es) FOG es un sistema de gestión de inventario, clonación, imágenes, suite de rescate. Una función de carga de archivos restringida incorrectamente permite a los usuarios autenticados ejecutar código arbitrario en el servidor de fogproject. La función de cambio de marca tiene una verificación en la imagen del banner del cliente que requiere que tenga 650 píxeles de ancho y 120 píxeles de alto. Aparte de eso, no hay controles sobre cosas como las extensiones de archivos. Se puede abusar de esto agregando un webshell PHP al final de la imagen y cambiando la extensión a cualquier cosa que el servidor web PHP analice. Esta vulnerabilidad se solucionó en 1.5.10.41.

31 Jul 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-31 19:15

Updated : 2024-09-05 17:09


NVD link : CVE-2024-40645

Mitre link : CVE-2024-40645

CVE.ORG link : CVE-2024-40645


JSON object : View

Products Affected

fogproject

  • fogproject
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type