Ebrahim Hegazy is a Cyber Security Analyst Consultant at Q-CERT, has found a serious vulnerability in Twitter that allows an attacker to upload files of any extension including PHP.
Hegazy said The vulnerability allowed me to bypass this security check/validation and to successfully upload .htaccess and .php files to twimg.com server. twimg.com is working as a CDN (content delivery network) which mean that every time I upload a file it will be hosted on a different server/subdomain for twimg.com and twimg.com works as a CDN and so upload PHP files in this instance would not allow an attacker to execute commands on the server, but the vulnerability could allow the service to be employed as as a botnet command and control server and to host malicious code.
He was released a Video proof that is demonstarting the vulnerability allowed him to bypass security validation and an attacker can successfully upload the .htacces and .PHP files to twimg.com server.
Hegazy said The vulnerability allowed me to bypass this security check/validation and to successfully upload .htaccess and .php files to twimg.com server. twimg.com is working as a CDN (content delivery network) which mean that every time I upload a file it will be hosted on a different server/subdomain for twimg.com and twimg.com works as a CDN and so upload PHP files in this instance would not allow an attacker to execute commands on the server, but the vulnerability could allow the service to be employed as as a botnet command and control server and to host malicious code.
He was released a Video proof that is demonstarting the vulnerability allowed him to bypass security validation and an attacker can successfully upload the .htacces and .PHP files to twimg.com server.
No comments:
Post a Comment