Miggo Logo

CVE-2022-22929: Arbitrary File Upload in Mingsoft MCMS

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.8514%
Published
1/22/2022
Updated
7/8/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
net.mingsoft:ms-mcmsmaven<= 5.2.4

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from two key functions: 1) The template upload handler that accepts ZIP files without proper content validation, and 2) The ZIP extraction mechanism that places unverified template files (including .ftl files with dangerous Freemarker directives) into executable locations. The combination allows attackers to upload malicious templates containing #exec directives or other dangerous Freemarker code that gets executed when the template is rendered. The high confidence comes from the documented attack flow involving ZIP uploads leading to code execution through template rendering, which requires these two functional components to be vulnerable.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

M*MS v*.*.* w*s *is*ov*r** to **v* *n *r*itr*ry *il* uplo** vuln*r**ility in t** N*w T*mpl*t* mo*ul*, w*i** *llows *tt**k*rs to *x**ut* *r*itr*ry *o** vi* * *r**t** ZIP *il*.

Reasoning

T** vuln*r**ility st*ms *rom two k*y *un*tions: *) T** t*mpl*t* uplo** **n*l*r t**t ****pts ZIP *il*s wit*out prop*r *ont*nt v*li**tion, *n* *) T** ZIP *xtr**tion m****nism t**t pl***s unv*ri*i** t*mpl*t* *il*s (in*lu*in* .*tl *il*s wit* **n**rous *r