CVE-2020-5256 – ssddanbrown/bookstack
Package
Manager: composer
Name: ssddanbrown/bookstack
Vulnerable Version: >=0 <0.25.5
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
EPSS: 0.00675 pctl0.70577
Details
Remote Code Execution Through Image Uploads in BookStack ### Impact A user could upload PHP files through image upload functions, which would allow them to execute code on the host system remotely. They would then have the permissions of the PHP process. This most impacts scenarios where non-trusted users are given permission to upload images in any area of the application. ### Patches The issue was addressed in a series of patches: v0.25.3, v0.25.4 and v0.25.5. Users should upgrade to at least v0.25.5 to avoid this patch but ideally the latest BookStack version as previous versions are un-supported. ### Workarounds Depending on BookStack version, you could use the [local_secure](https://www.bookstackapp.com/docs/admin/upload-config/#local-secure) image storage option, or use s3 or a similar compatible service. Preventing direct execution of any `php` files, apart from the `public/index.php` file, though web-server configuration would also prevent this. ### References [BookStack Beta v0.25.3](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.3) [BookStack Beta v0.25.4](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.4) [BookStack Beta v0.25.5](https://github.com/BookStackApp/BookStack/releases/tag/v0.25.5) ### For more information If you have any questions or comments about this advisory: * Open an issue in [the BookStack GitHub repository](BookStackApp/BookStack/issues). * Ask on the [BookStack Discord chat](https://discord.gg/ztkBqR2). * Follow the [BookStack Security advise](https://github.com/BookStackApp/BookStack#-security) to contact someone privately.
Metadata
Created: 2020-03-13T20:21:27Z
Modified: 2021-01-08T21:18:55Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/03/GHSA-g9rq-x4fj-f5hx/GHSA-g9rq-x4fj-f5hx.json
CWE IDs: ["CWE-95"]
Alternative ID: GHSA-g9rq-x4fj-f5hx
Finding: F004
Auto approve: 1