CVE-2024-13210

4.7 MEDIUM

πŸ“‹ TL;DR

This vulnerability allows remote attackers to upload arbitrary files to the donglight bookstore e-commerce system through the uploadPicture function. Attackers can exploit this to upload malicious files like web shells, potentially gaining unauthorized access to the server. Anyone running version 1.0 of this system is affected.

πŸ’» Affected Systems

Products:
  • donglight bookstoreη”΅ε•†δΉ¦εŸŽη³»η»Ÿθ―΄ζ˜Ž
Versions: 1.0
Operating Systems: Any OS running Java
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the AdminBookController.java file specifically. Requires the admin upload functionality to be accessible.

πŸ“¦ What is this software?

⚠️ Risk & Real-World Impact

πŸ”΄

Worst Case

Complete server compromise via web shell upload leading to data theft, ransomware deployment, or use as attack infrastructure.

🟠

Likely Case

Unauthorized file upload leading to web shell installation and limited server access.

🟒

If Mitigated

File upload attempts blocked or quarantined with no successful exploitation.

🌐 Internet-Facing: HIGH
🏒 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: βœ… No
Complexity: LOW

Exploit details are publicly disclosed on GitHub. Attack requires access to the upload functionality, which may require authentication.

πŸ› οΈ Fix & Mitigation

βœ… Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Check GitHub repository for updates or apply workarounds.

πŸ”§ Temporary Workarounds

Implement file upload validation

all

Add server-side validation to restrict uploaded files to specific extensions and scan for malicious content.

Modify src/main/java/org/zdd/bookstore/web/controller/admin/AdminBookController.java to add file type validation

Disable upload functionality

all

Temporarily disable the picture upload feature in admin interface.

Comment out or remove uploadPicture endpoint in AdminBookController

🧯 If You Can't Patch

  • Implement WAF rules to block suspicious file uploads
  • Restrict network access to admin interface using firewall rules

πŸ” How to Verify

Check if Vulnerable:

Check if you can upload files with extensions like .jsp, .php, .exe through the admin book picture upload feature.

Check Version:

Check application version in configuration files or about page

Verify Fix Applied:

Attempt to upload restricted file types and verify they are rejected with proper validation messages.

πŸ“‘ Detection & Monitoring

Log Indicators:

  • Unusual file uploads to admin endpoints
  • Files with suspicious extensions in upload directories

Network Indicators:

  • POST requests to uploadPicture endpoint with unusual file types

SIEM Query:

source="web_logs" AND uri="/admin/uploadPicture" AND (file_extension="jsp" OR file_extension="php" OR file_extension="exe")

πŸ”— References

πŸ“€ Share & Export