Remote code execution on Basecamp.com

Disclosed: 2020-11-26 18:22:15 By gammarex To basecamp
Critical
Vulnerability Details
A critical flaw in Basecamp's profile image upload function leads to remote command execution. Images are converted on the server side, but not only image files but also PostScript/EPS files are accepted (if renamed to .gif). This is probably due to ImageMagick / GraphicsMagick being used for image conversion, which calls a PostScript interpreter (Ghostscript) if the input file starts with '%!'. The used Ghostscript version however has a security bug (CVE-2017-8291) leading to remote command execution. /Proof of concept/: Upload the attached rce.gif file as profile image (change the `ping -c1 attacker.com' to some other shell command). /Mitigation/: Upgrade Ghostscript; also, before processing uploaded images make sure they are real image files (e.g. based on magic header) ## Impact Gain a remote shell; from here start exploitation/privilege escalation
Actions
View on HackerOne
Report Stats
  • Report ID: 365271
  • State: Closed
  • Substate: resolved
  • Upvotes: 410
Share this report