A Cross-Site Request Forgery vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim. An admin can run commands using the FileBrowser and hence it leads to RCE.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d | third party advisory patch |
https://febin0x4e4a.blogspot.com/2022/01/critical-csrf-in-filebrowser.html | third party advisory exploit |
https://febin0x4e4a.wordpress.com/2022/01/19/critical-csrf-in-filebrowser/ | third party advisory exploit |
https://systemweakness.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7 | third party advisory exploit |
http://packetstormsecurity.com/files/165885/FileBrowser-2.17.2-Code-Execution-Cross-Site-Request-Forgery.html | exploit vdb entry third party advisory |
https://febinj.medium.com/critical-csrf-to-rce-in-filebrowser-865a3c34b8e7 | third party advisory exploit |