S4E Mobile Logo

Earcms Application Distribution System Unrestricted File Upload Scanner

Detects 'Unrestricted File Upload' vulnerability in Earcms Application Distribution System.

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

2 days 7 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

Earcms Application Distribution System is widely used by developers and enterprises for managing and distributing web applications efficiently. It is renowned for its flexibility in handling application deployments across multiple environments. The system allows users to manage versions and roll out updates seamlessly. As a pivotal tool in many IT infrastructures, Earcms is indispensable for ensuring smooth application delivery and management. Organizations rely on it to streamline operations and achieve faster go-to-market strategies. The system's robust features make it a critical asset in modern software development life cycles.

Unrestricted File Upload vulnerabilities can pose a significant threat to web applications, enabling attackers to upload harmful files that can be executed on the server. This type of vulnerability circumvents secure upload mechanisms, potentially allowing unauthorized access or arbitrary code execution. Exploiting this weakness can lead to severe security breaches in the affected systems. The vulnerability can compromise data integrity and confidentiality by allowing the attacker to execute scripts or commands remotely. With unrestricted file uploads, attackers might also install backdoors, leading to further exploitation of the system. Addressing this vulnerability is crucial for maintaining application security and preventing data breaches.

The vulnerability in Earcms Application Distribution System is located in the endpoint '/earcms/source/pack/upload/index-uplog.php'. The parameter 'app' in the POST request is susceptible to the unrestricted file upload, where attackers can upload malicious files. The matcher checks for a successful upload by confirming a 200 status code and a specific response pattern in the body. The vulnerability allows attackers to store and potentially execute arbitrary PHP code by specifying the 'filename' in the form data. This lack of proper validation and sanitization of the upload process makes the system vulnerable. Such technical oversights necessitate stringent input validation and stricter file type enforcement.

When exploited, this vulnerability can lead to unauthorized code execution on the server, potentially compromising the entire application. Malicious files uploaded to the server can be executed, granting attackers remote access or control over the server's operations. This could lead to significant data breaches, unauthorized system modifications, and service disruptions. The exploitation can also pave the way for further network infiltration, posing a threat to other connected systems. The absence of checks can expose sensitive data and allow for the installation of backdoors, making the system a target for continued attacks. It underscores the necessity of implementing strict file upload policies and intrusion detection mechanisms.

REFERENCES

Get started to protecting your digital assets