You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
And the only mitigation to stop file inclusion is in line 5 which does to stop referencing files with path transverse like ../../file.etc $bindlog = str_replace('..', '__', $_GET['inBindLog']);
However, this is insufficient fix because one can send payloads like .%00./.%00./file.etc as PHP before 5.3.6 truncates nullbytes and treats them as empty values letting us sneak ../../file.etc.
Fix should include null bytes or a more thought implementation.
Thanks,
The text was updated successfully, but these errors were encountered:
Yes, I just looked and this seems consistent with the actual zpanel code, any authenticated user can use this bug to read any file or achieve RCE by either reading sensetive config files or system files.
Hey,
zpanelx/modules/dns_admin/code/getbindlog.php says:
And the only mitigation to stop file inclusion is in line 5 which does to stop referencing files with path transverse like ../../file.etc
$bindlog = str_replace('..', '__', $_GET['inBindLog']);
However, this is insufficient fix because one can send payloads like .%00./.%00./file.etc as PHP before 5.3.6 truncates nullbytes and treats them as empty values letting us sneak ../../file.etc.
Fix should include null bytes or a more thought implementation.
Thanks,
The text was updated successfully, but these errors were encountered: