Skip Menu |

Preferred bug tracker

Please visit the preferred bug tracker to report your issue.

This queue is for tickets about the Cloudinary CPAN distribution.

Report information
The Basics
Id: 127734
Status: new
Priority: 0/
Queue: Cloudinary

People
Owner: Nobody in particular
Requestors: sachincyber25 [...] gmail.com
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: (no value)



Subject: Malicious File Upload
Date: Mon, 19 Nov 2018 11:38:47 +0530
To: bug-Cloudinary [...] rt.cpan.org
From: Sachin Gupta <sachincyber25 [...] gmail.com>
Dear Sir, I am Sachin Gupta from India.I am a Security Researcher.I have found a security vulnerability in your website. Malicious File Upload: Code vulnerable to remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating attacks, such as total server compromise.Malicious file execution attacks affect PHP, XML and any framework which accepts filenames or files from users. Link - https://cloudinary.com/jobs/ta_lead Upload Null byte File. Solution: The following solutions are recommended to fix this flaw: I. Application should check allowed File extension and File type (MIME Type) in the upload module using white-list filter at server side. II. File to be uploaded should be restricted to a particular size. III. Server side check for not allowing long filename with double extension/double dot(.)/nullbyte(%00)/meta characters. IV. Assign only Read and Write permissions to the upload folders as required. -- Sachin Gupta Managing Director www.cyberzone.org.in +91-8418888833 Official Page- https://www.facebook.com/LearnethicalHackingFromSachinGuptaMayankKhare
Download 4.jpg
image/jpeg 253.9k

Message body is not shown because sender requested not to inline it.

Download test1.html%00.docx
application/octet-stream 62b

Message body not shown because it is not plain text.