Miggo Logo

CVE-2021-46062: MCMS Arbitrary File Deletion vulnerability

7.1

CVSS Score
3.1

Basic Information

EPSS Score
0.37911%
Published
2/19/2022
Updated
9/25/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
net.mingsoft:ms-basicmaven< 2.1.162.1.16
net.mingsoft:ms-mcmsmaven< 5.2.115.2.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability occurs when processing the oldFileName parameter in writeFileContent requests. TemplateAction.writeFileContent handles the vulnerable endpoint and passes user input to FileUtil.deleteFile. BasicUtil.getRealTemplatePath is involved in path resolution but fails to sanitize traversal sequences. These functions form the attack chain: user input flows through TemplateAction -> BasicUtil (path resolution) -> FileUtil (deletion). High confidence in TemplateAction and FileUtil roles based on explicit references in GHSA description and issue #59. Medium confidence in BasicUtil's role as path resolver mentioned in issue comments but without seeing actual path sanitization flaws in code.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

`n*t.min*so*t:ms-**si*` is us** *or plu*in m*n***m*nt *or *ppli**tions *uilt wit* M*v*n *or t** [Min***i *ont*nt M*n***m*nt Syst*m (M*MS)](*ttps://*it**.*om/min*So*t/M*MS). ms-**si* ***or* *.*.** is vuln*r**l* to *r*itr*ry *il* **l*tion usin* POST r*

Reasoning

T** vuln*r**ility o**urs w**n pro**ssin* t** `ol**il*N*m*` p*r*m*t*r in `writ**il**ont*nt` r*qu*sts. `T*mpl*t***tion.writ**il**ont*nt` **n*l*s t** vuln*r**l* *n*point *n* p*ss*s us*r input to `*il*Util.**l*t**il*`. `**si*Util.**tR**lT*mpl*t*P*t*` is