Apache OpenMeetings 1.9.x < 3.1.0 - '.ZIP' File Directory Traversal

Author: Andreas Lindh
type: webapps
platform: linux
port: 5080.0
date_added: 2016-03-31  
date_updated: 2016-03-31  
verified: 0  
codes: CVE-2016-0784  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 39642.txt  
Severity: Moderate

Vendor: The Apache Software Foundation

Versions Affected: Apache OpenMeetings 1.9.x - 3.1.0

Description:
The Import/Export System Backups functionality in the OpenMeetings
Administration menu (http://domain:5080/openmeetings/#admin/backup) is vulnerable to path
traversal via specially crafted file names within ZIP archives.

By uploading an archive containing a file named ../../../public/hello.txt will write
the file "hello.txt" to the http://domain:5080/openmeetings/public/ directory. This could
be used to, for example, overwrite the /usr/bin/convert file (or any other 3 rd party
integrated executable) with a shell script, which would be executed the next time an image
file is uploaded and imagemagick is invoked.

All users are recommended to upgrade to Apache OpenMeetings 3.1.1

Credit: This issue was identified by Andreas Lindh

Apache OpenMeetings Team

--
WBR
Maxim aka solomax