- Affects: Magento 1 - Amasty Feed
- Date: 2016-07-20
- Author: Jeroen Boersma [email protected]
- 2.4.1+
- 3.2.3+
- <3.3.4
File: app/code/local/Amasty/Feed/controllers/MainController.php
Code line:
class Amasty_Feed_MainController extends Mage_Core_Controller_Front_Action
{
public function downloadAction()
{
$fileName = $this->getRequest()->getParam('file');
$download = Mage::helper('amfeed')->getDownloadPath('feeds', $fileName);
$this->_prepareDownloadResponse($fileName, file_get_contents($download));
}
}
Files are shared and downloaded via a controller instead of just sharing a url.
The path would be /amfeed/main/download/file/feed_google.xml/
for example.
The default path would become /media/amfeed/feeds/feed_google.xml
. And by just using a default file_get_contents()
it will just read and process the file.
Because of the lack of parameter santinizing it is possible to download any file where you know the path too, for example app/etc/local.xml
. This way you could expose database credentials and adminpaths.
Or even worse /etc/passwd
or others if no chrooting or base dir restriction is in effect.
Magento's ->getRequest->getParam('file')
looks for parameters from path
but also from _POST
and _GET
.
So by changing from the path
to the query
gives us the possibility to inject extra information like ../
, this is where it goes wrong.
Just replace /amfeed/main/download/file/feed_google.xml/
with /amfeed/main/download?file=feed_google.xml
to start of. Which will do the same, after that of coarse the obvious.
Magento only: Create a url like this /amfeed/main/download?file=../../../app/etc/local.xml
which will translate to /media/amfeed/feeds/../../../app/etc/local.xml
and there you have Magento secrets file. This will work for any file within Magento.
Escaped urls are posisble to, /amfeed/main/download/file/..%2F..%2F..%2Fapp%2Fetc%2Flocal.xml
, so you have close the whole gate, not only unset the file
parameter.
System wide: Create a url like this /amfeed/main/download?file=../../../../../../../../../../../../etc/passwd
which will translate to /media/amfeed/feeds/../../../../../../../../../../../../etc/passwd
and there you have your systems passwd file if no other system security is applied.
Received a patched version from Amasty on 2016-07-25. If you are using this module contact Amasty support to receive the latest patched version for the module. Version 3.3.4 is released on 2016-07-24 on their website. Magento connect isn't updated yet.
Patching your app/code/local/Amasty/Feed/controllers/MainController.php
Patched Code:
class Amasty_Feed_MainController extends Mage_Core_Controller_Front_Action
{
public function downloadAction()
{
$fileName = $this->getRequest()->getParam('file');
/**
* Verify path before proceeding download
* @reference https://gist.github.com/JeroenBoersma/55b617bc59cd1a647a60a5386cf2cd2a/edit
*/
$checkPath = realpath(Mage::helper('amfeed')->getDownloadPath('feeds', ''));
$download = realpath(Mage::helper('amfeed')->getDownloadPath('feeds', $fileName));
if (strpos($download, $checkPath) === false) {
return $this->norouteAction();
}
$this->_prepareDownloadResponse($fileName, file_get_contents($download));
}
}
Patch file attached for 3.2.x
Better would be to just link with a media url, this way only webserver security is needed and the controller could be dropped. Also if a CDN is in place it work without bothering Magento.
The attachment amfeed_lfd_test.sh
can be used to remotly test for vulnerable sites.
Usage: amfeed_lfd_test.sh https://myshopbaseurl.com/
If a shop is vulnerable: amfeed_lfd_test.sh version https://myshopbaseurl.com/
to read exact version from Mage.php.
More can be found by invoking amfeed_lfd_test.sh
without any parameters.
Because I'm aware of the conciquences when this is in the wild, public information and timelime can be found in the public part of this disclosure. See https://gist.github.com/JeroenBoersma/87b7c996f66b96b2a24d8977b1b165ac