You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
An issue was discovered in ISPConfig before 3.2.11p1. PHP code injection can be achieved in the language file editor by an admin if admin_allow_langedit is enabled.
19
+
This module exploits a PHP code injection vulnerability in ISPConfig's
20
+
language_edit.php file. The vulnerability occurs when the `admin_allow_langedit`
21
+
setting is enabled, allowing authenticated administrators to inject arbitrary
22
+
PHP code through the language editor interface.
23
+
24
+
This module will automatically check if the required `admin_allow_langedit`
25
+
permission is enabled, and attempt to enable it if it's disabled (requires
26
+
admin credentials with system configuration access).
27
+
28
+
The exploit works by injecting a PHP payload into a language file, which
29
+
is then executed when the file is accessed. The payload is base64 encoded
30
+
and written using PHP's file_put_contents function.
20
31
},
21
32
'License'=>MSF_LICENSE,
22
33
'Author'=>[
@@ -139,6 +150,78 @@ def authenticate
139
150
true
140
151
end
141
152
153
+
defcheck_langedit_permission
154
+
print_status('Checking if admin_allow_langedit is enabled...')
155
+
156
+
# Try to access the language editor to see if it's accessible
0 commit comments