Vulnerable Path:

/admin/extensions/upload.php

Description

Rootcause: the code snippet with the path at Line 590 (on version 4.5.05) contains a file upload function that lacks through security checks, enabling hackers to exploit the upload vulnerability.

https://github.com/nukeviet/nukeviet/blob/4.5.05/admin/extensions/upload.php#L590

With this vulnerability, an attacker can exploit it to gain control of the system if they have an admin account..

Reproduce

Create a valid zip file containing the config.ini file in the correct format inside.

Untitled

The uploaded webshell file must reside alongside the config.ini file and be at the top level of the zip file.

After successfully creating the zip file, proceed with uploading it to the following path: admin/index.php?language=vi&nv=extensions&op=manage

Untitled

After the upload, Nukeviet CMS will notify that the zip file containing the webshell inside is valid.

Untitled

After installation, the shell file has been successfully uploaded to the server at the web root.

Untitled

So, you have successfully uploaded the Fruit.php webshell to the server.

Untitled