An unrestricted file upload vulnerability exists in ProcessMaker versions prior to 3.5.4 due to improper handling of uploaded plugin archives. An attacker with administrative privileges can upload a malicious .tar plugin file containing arbitrary PHP code. Upon installation, the plugin’s install() method is invoked, resulting in execution of attacker-supplied PHP code on the server with the privileges of the web server user. This vulnerability can be chained with CVE-2022-38577 — a privilege escalation flaw in the user profile page — to achieve full remote code execution from a low-privileged account.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/processmaker_plugin_upload.rb | exploit |
https://wiki.processmaker.net/3.0/Plugin_Development | product |
https://www.fortiguard.com/encyclopedia/ips/45757 | third party advisory |
https://www.exploit-db.com/exploits/44399 | exploit |
https://process-maker-authenticated-plugin-upload-rce | third party advisory |
https://vulncheck.com/advisories/process-maker-authenticated-plugin-upload-rce | third party advisory |