A low privilege user account with page edit privilege can read any server files using Twig Syntax. This includes Grav user account files - /grav/user/accounts/*.yaml. This file stores hashed user password, 2FA secret, and the password reset token. This can allow an adversary to compromise any registered account by resetting a password for a user to get access to the password reset token from the file or by cracking the hashed password.
{{ read_file('/var/www/html/grav/user/accounts/riri.yaml') }}
Use the above Twig template syntax in a page and observe that the administrator riri's authentication details are exposed accessible by any unauthenticated user.
As an additional proof of concept for reading system files, observe the /etc/passwd
file read using the following Twig syntax:
{{ read_file('/etc/passwd') }}
This can allow a low privileged user to perform a full account takeover of other registered users including Adminsitrators. This can also allow an adversary to read any file in the web server.
{ "nvd_published_at": "2024-05-15T17:15:12Z", "cwe_ids": [ "CWE-22", "CWE-269" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-05-15T17:15:51Z" }