Pentesting Gibbon LMS
Gibbon Edu is an open-source educational software designed for schools and institutions to manage their administrative and academic processes . It offers a range of features to facilitate communication, collaboration, and organization within the educational community.
Well known vulnerabilities
Version 25.0.01: unregistered arbitrary upload leading to remote code execution
HackTheBox machine: The Frizz.
Source: https://herolab.usd.de/security-advisories/usd-2023-0025/
Advisory ID: usd-2023-0025
Product: Gibbon (https://gibbonedu.org/)
Affected Version: 25.0.01 (before commit '226d83568cf3d447c4d86d4e5aba2c6e6289045d')
Vulnerability Type: CWE-434: Arbitrary File Write
Security Risk: Critical
Vendor URL: https://gibbonedu.org
Vendor acknowledged vulnerability: Yes
Vendor Status: Fixed
CVE Number: CVE-2023-45878
CVE Link: https://nvd.nist.gov/vuln/detail/CVE-2023-45878
Description: Unauthenticated attackers can upload arbitrary files to the application and receive code execution on the underlying system.To receive RCE an attacker must craft a fake image which can be stored as PHP file.
POC (from HackTheBox machine The Frizz):
The Rubrics module has a file rubrics_visualise_saveAjax.php (source )which can be accessed without being authenticated. The file accepts the img, path and gibbonPersonID as POST parameters. The payload must be base64 encoded seperated by ; and , characters.
Upload:
Trigger:
With curl:
Upload:
Trigger: