CVE-2024-13210
π TL;DR
This vulnerability allows remote attackers to upload arbitrary files to the donglight bookstore e-commerce system through the uploadPicture function. Attackers can exploit this to upload malicious files like web shells, potentially gaining unauthorized access to the server. Anyone running version 1.0 of this system is affected.
π» Affected Systems
- donglight bookstoreη΅εδΉ¦εη³»η»θ―΄ζ
π¦ What is this software?
Bookstore by Donglight
β οΈ Risk & Real-World Impact
Worst Case
Complete server compromise via web shell upload leading to data theft, ransomware deployment, or use as attack infrastructure.
Likely Case
Unauthorized file upload leading to web shell installation and limited server access.
If Mitigated
File upload attempts blocked or quarantined with no successful exploitation.
π― Exploit Status
Exploit details are publicly disclosed on GitHub. Attack requires access to the upload functionality, which may require authentication.
π οΈ Fix & Mitigation
β Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
No official patch available. Check GitHub repository for updates or apply workarounds.
π§ Temporary Workarounds
Implement file upload validation
allAdd server-side validation to restrict uploaded files to specific extensions and scan for malicious content.
Modify src/main/java/org/zdd/bookstore/web/controller/admin/AdminBookController.java to add file type validation
Disable upload functionality
allTemporarily disable the picture upload feature in admin interface.
Comment out or remove uploadPicture endpoint in AdminBookController
π§― If You Can't Patch
- Implement WAF rules to block suspicious file uploads
- Restrict network access to admin interface using firewall rules
π How to Verify
Check if Vulnerable:
Check if you can upload files with extensions like .jsp, .php, .exe through the admin book picture upload feature.
Check Version:
Check application version in configuration files or about page
Verify Fix Applied:
Attempt to upload restricted file types and verify they are rejected with proper validation messages.
π‘ Detection & Monitoring
Log Indicators:
- Unusual file uploads to admin endpoints
- Files with suspicious extensions in upload directories
Network Indicators:
- POST requests to uploadPicture endpoint with unusual file types
SIEM Query:
source="web_logs" AND uri="/admin/uploadPicture" AND (file_extension="jsp" OR file_extension="php" OR file_extension="exe")