Loading HuntDB...

Possible RCE

N
Nextcloud
Submitted None
Reported by paulos__

Vulnerability Details

Technical details and impact analysis

Command Injection - Generic
Hello, I just quickly took a glance, I am not entirely sure or didn't get a chance to test it but it seems there are some serious bugs. In */apps/user_ldap/ajax/wizard.php*: ```php 36: $action = (string)$_POST['action']; ``` and it is called in multiple places. including line 83 & 99. one being `$action($loginName);` & since `$loginName` is defined as: ```php $loginName = $_POST['ldap_test_loginname']; ``` would mean an RCE is achievable when $result is called ```php $result = $wizard->$action($loginName); ``` This is because userinput is used as dynamic function name. ergo, arbitrary functions may be called. All an attacker have to send is a POST request with action parameter containing a function name like action=eval&ldap_test_loginname=stufftoexecute There is a very little chance the $wizard will stop this because arbritary wakeup & constract objects may be exploitable. like I said, I didn't get a chance to test this but seems fairly feasible. please think about it and let me know. Thanks, P

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Command Injection - Generic