CVE-2022-31366 An arbitrary file upload vulnerability in api_labs.php of EVE-NG 2.0.3-112 Community allows attackers to execute arbitrary code.

The available UNL files are specified in the code, allowing an attacker to control the code that gets executed, leading to a full compromise of the application. The API import feature in the EVE community is used to import data from external sources, such as source code management systems and other collaboration software. An attacker can upload a malicious UNL file to the import API and then import it to the application, leading to code execution. This arbitrary code can be used to access data on the application for malicious purposes, such as stealing data or installing malware. An attacker can also upload a malicious UNL file with a malicious UNL schema, or a malicious UNL file with a malicious UNL schema and malicious code, to the import API. By doing this, the attacker can control the code that gets executed. This can lead to a full compromise of the application. The API import feature in the EVE community is used to import data from external sources, such as source code management systems and other collaboration software. An attacker can upload a malicious UNL file to the import API and then import it to the application, leading to code execution. This arbitrary code can be used to access data on the application for malicious purposes, such as stealing data or installing malware. An attacker can also upload a malicious UNL file with a malicious UNL schema, or a malicious UNL file with a malicious UNL schema and malicious code, to the import API

Team Viewer Remote Code Execution Vulnerability

Team Viewer is a remote desktop application that allows users to remotely access their computer or laptop from any other device. This can be used for different purposes, such as troubleshooting, collaboration and support. An attacker can exploit a vulnerability in Team Viewer to execute code on the remote machine without user interaction or detection. The vulnerability lets an attacker upload a malicious UNL file with a malicious UNL schema, or one with a malicious UNL schema and malicious code, to the import API. By doing this, the attacker can control the code that gets executed and perform actions such as stealing data or installing malware.

Confidence rating: strong

The application has a high confidence rating because the file upload feature is explicitly designed to allow external users to import and export files. The EVE community is also open source, which means it has a strong history of security vulnerabilities, including this one.

Timeline

Published on: 10/20/2022 12:15:00 UTC
Last modified on: 10/21/2022 16:18:00 UTC

References