CVE-2021-46062: MCMS Arbitrary File Deletion vulnerability
7.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.37911%
CWE
Published
2/19/2022
Updated
9/25/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
net.mingsoft:ms-basic | maven | < 2.1.16 | 2.1.16 |
net.mingsoft:ms-mcms | maven | < 5.2.11 | 5.2.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs when processing the oldFileName
parameter in writeFileContent
requests. TemplateAction.writeFileContent
handles the vulnerable endpoint and passes user input to FileUtil.deleteFile
. BasicUtil.getRealTemplatePath
is involved in path resolution but fails to sanitize traversal sequences. These functions form the attack chain: user input flows through TemplateAction
-> BasicUtil
(path resolution) -> FileUtil
(deletion). High confidence in TemplateAction
and FileUtil
roles based on explicit references in GHSA description and issue #59. Medium confidence in BasicUtil
's role as path resolver mentioned in issue comments but without seeing actual path sanitization flaws in code.