CVE-2020-36079
📋 TL;DR
Zenphoto CMS versions through 1.5.7 allow authenticated administrators to upload arbitrary files, including PHP web shells, leading to remote code execution. This affects all Zenphoto installations with the vulnerable uploader plugin enabled. The vendor disputes the severity since exploitation requires admin privileges.
💻 Affected Systems
- Zenphoto CMS
📦 What is this software?
Zenphoto by Zenphoto
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise via web shell upload, allowing attacker to execute arbitrary commands, steal data, pivot to internal networks, or maintain persistent access.
Likely Case
Privileged admin user (malicious or compromised) uploads PHP backdoor to gain persistent remote access and execute code on the web server.
If Mitigated
Limited impact due to admin-only access requirement and proper file upload restrictions in place.
🎯 Exploit Status
Exploitation requires admin credentials. Public proof-of-concept demonstrates file upload via drag-and-drop in elFinder interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: None
Vendor Advisory: https://www.zenphoto.org/news/why-not-every-security-issue-is-really-an-issue/
Restart Required: No
Instructions:
No official patch. Vendor considers this expected admin functionality. Upgrade to latest version and implement workarounds.
🔧 Temporary Workarounds
Disable elFinder uploader
allRemove or disable the elFinder file manager component from the uploader plugin.
Remove elFinder directory from plugins/uploader/
Restrict file upload extensions
linuxConfigure web server to block execution of uploaded PHP files in upload directories.
Add to .htaccess: <FilesMatch "\.(php|php5|phtml)$">
Deny from all
</FilesMatch>
🧯 If You Can't Patch
- Implement strict access controls and monitoring for admin accounts
- Regularly audit uploaded files and server file system for suspicious PHP files
🔍 How to Verify
Check if Vulnerable:
Check Zenphoto version in admin dashboard or readme.txt. If version ≤1.5.7 and uploader plugin with elFinder is enabled, system is vulnerable.
Check Version:
Check admin dashboard or readme.txt file in Zenphoto root directory
Verify Fix Applied:
Verify elFinder is disabled or removed from uploader plugin. Test file upload functionality with PHP files.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to uploader plugin, especially PHP files
- Admin account activity from unexpected locations/times
Network Indicators:
- HTTP POST requests to upload endpoints with PHP file content
- Subsequent requests to uploaded PHP files
SIEM Query:
source="web_server" (uri_path="/plugins/uploader/" AND method="POST") OR (uri_path CONTAINS ".php" AND referrer CONTAINS "uploader")
🔗 References
- http://packetstormsecurity.com/files/161569/Zenphoto-CMS-1.5.7-Shell-Upload.html
- https://github.com/zenphoto/zenphoto/issues/1292
- https://www.zenphoto.org/news/why-not-every-security-issue-is-really-an-issue/
- http://packetstormsecurity.com/files/161569/Zenphoto-CMS-1.5.7-Shell-Upload.html
- https://github.com/zenphoto/zenphoto/issues/1292
- https://www.zenphoto.org/news/why-not-every-security-issue-is-really-an-issue/