ATutor 2.2.4 allows Arbitrary File Upload and Directory Traversal, resulting in remote code execution via a ".." pathname in a ZIP archive to the mods/_core/languages/language_import.php (aka Import New Language) or mods/_standard/patcher/index_admin.php (aka Patcher) component.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/fuzzlove | third party advisory |
https://github.com/fuzzlove/ATutor-2.2.4-Language-Exploit | third party advisory exploit |
http://incidentsecurity.com/atutor-2-2-4-language_import-arbitrary-file-upload-rce/ | url repurposed exploit third party advisory |
http://packetstormsecurity.com/files/153870/ATutor-2.2.4-Arbitrary-File-Upload-Command-Execution.html | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/158246/ATutor-2.2.4-Directory-Traversal-Remote-Code-Execution.html | exploit vdb entry third party advisory |