[CVE-2021–28379] Abusing file uploads to get an SSH backdoor
好的,用户让我总结一下这篇文章的内容,控制在100字以内,而且不需要特定的开头。我得先仔细看看文章内容。 文章主要讲的是作者在研究VestaCP的安全漏洞。他从上传功能入手,发现可能有安全问题。然后他查看了源代码,特别是UploadHandler.php文件,推测构造函数处理上传过程,可能存在漏洞。 所以,我需要把这些关键点浓缩到100字以内。确保涵盖研究目标、方法和发现。 可能的结构是:研究VestaCP安全漏洞,分析上传功能源代码,特别是UploadHandler类的构造函数,寻找潜在漏洞。 这样既简洁又全面。 </think> 作者研究了VestaCP的安全漏洞,重点分析了其上传功能的源代码,并推测UploadHandler类的构造函数可能存在安全问题。 2026-1-26 09:12:23 Author: infosecwriteups.com(查看原文) 阅读量:0 收藏

Fady Othman

Free Link

Note: To fully understand the exploit you will need to fully understand how ssh keys are setup, so you will need to read this article.

I was looking at the scope for SSD Secure Disclosure and I noticed one of the targets is VestaCP, I decided to take a look at the source code to see if I would be able to find anything interesting.

I started by looking at the upload functionality as it’s often misused and usually have security issues, the source code for VestaCP can be found Here.

To install VestaCP follow the instructions at https://vestacp.com/install/ on an Ubuntu VM.

The upload functionality is implemented under /web/upload let's take a look at the index.php file to see how it's implemented.

<?php /* * jQuery File Upload Plugin PHP Example 5.14 * https://github.com/blueimp/jQuery-File-Upload * * Copyright 2010, Sebastian Tschan * https://blueimp.net * * Licensed under the MIT license: * http://www.opensource.org/licenses/MIT */ error_reporting(E_ALL | E_STRICT); require('UploadHandler.php'); $upload_handler = new UploadHandler();

As seen in the above code all what the code does is creating an instance of the UploadHandler class this probably means that the class constructor should handle the upload process, so let's take a look at the constructor of that class, the class is implemented in /web/upload/UploadHandler.php file, at the beginning of…


文章来源: https://infosecwriteups.com/cve-2021-28379-abusing-file-uploads-to-get-an-ssh-backdoor-77fdcef4d971?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh