Researchers Uncover Crucial Vulnerability in PHPFusion CMS



Safety researchers have found what they described as a vital vulnerability within the comparatively extensively used PHPFusion open supply content material administration system (CMS).

The authenticated native file inclusion flaw, recognized as CVE-2023-2453, permits for distant code execution if an attacker can add a maliciously crafted “.php” file to a recognized path on a goal system.

It’s one in all two vulnerabilities that researchers at Synopsys found just lately in PHPFusion. The opposite flaw, tracked as CVE-2023-4480, is a moderate-severity bug within the CMS that offers attackers a solution to learn the contents of information on an affected system and likewise to write down information to arbitrary places on it.

The vulnerabilities exist in variations 9.10.30 of PHPFusion and earlier. No patch is presently accessible for both flaw.

No Patch Out there But

Synopsys stated it tried to contact directors at PHPFusion a number of instances, first through e-mail, then by a vulnerability disclosure course of, then GitHub, and at last through a neighborhood discussion board, earlier than disclosing it this week. PHPFusion didn’t reply to a request for remark from Darkish Studying.

PHPFusion is an open supply CMS that has been accessible since 2003. Although it’s not as effectively often called different content material administration programs comparable to WordPress, Drupal, and Joomla, some 15 million web sites around the globe presently use it, in accordance with the undertaking web site. Small and midsize companies typically use it for constructing on-line boards, community-driven web sites, and different on-line initiatives.

In accordance with Synopsis, CVE-2023-2453 stems from improper sanitization of sure varieties of information with tainted filenames. The problem offers attackers a possible solution to add and execute an arbitrary .php file on a susceptible PHPFusion server.

Situations for Exploitation

“Exploitation of this vulnerability has successfully two necessities,” says Matthew Hogg, software program engineer at Synopsys’ Software program Integrity Group, who found the vulnerability. One among them is that the attacker wants to have the ability to authenticate to a minimum of a low-privileged account, and the opposite is that they should know the susceptible endpoint. “By fulfilling each standards, a malicious actor would have the ability to craft a payload to take advantage of this vulnerability,” Hogg says.

Ben Ronallo, vulnerability administration engineer at Synopsys, says it is vital to notice that an attacker would want to search out some solution to add a maliciously crafted .php payload to any location on a susceptible system. “The attacker would want to evaluation the supply code of PHPFusion to establish the susceptible endpoint,” Ronallo says.

What an attacker can do after exploiting the vulnerability will depend on the privileges related to the PHPFusion consumer’s account. An attacker with entry to administrator credentials, as an example, can learn arbitrary information on the underlying working system. “Within the worst case, an attacker might obtain distant code execution (RCE), supplied they’ve some means to add a payload file to focus on for inclusion,” he says. “Each circumstances might consequence within the theft of delicate data, and the latter might enable management over the susceptible server.”

In the meantime, the much less extreme bug that Synopsys found in PHPFusion (CVE-2023-4480) is tied to an out-of-date dependency in a Fusion file supervisor part that’s accessible through the CMS’s admin panel. An attacker with the privileges of an administrator or tremendous administrator can exploit the vulnerability to both disclose the contents of information on a susceptible system or write sure varieties of information to recognized paths on the server’s file system, Synopsys stated.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles