CVE-2022-50944: Aero CMS 0.0.1 PHP Code Injection Vulnerability
Aero CMS 0.0.1 is vulnerable to PHP code injection (CVE-2022-50944), allowing an authenticated attacker to execute arbitrary PHP code by uploading malicious files through the image parameter, leading to remote code execution on the server.
Aero CMS 0.0.1 is susceptible to a PHP code injection vulnerability identified as CVE-2022-50944. This flaw allows authenticated attackers to inject and execute arbitrary PHP code on the affected server. The vulnerability is triggered by uploading a malicious PHP file through the image parameter when adding or modifying a post. Specifically, an attacker can send a crafted request to the /admin/posts.php endpoint with the source=add_post parameter, containing PHP code embedded within an image file. Successful exploitation allows the attacker to gain remote code execution, potentially leading to full system compromise. This poses a significant risk to organizations using Aero CMS 0.0.1, as it could enable data theft, service disruption, or further malicious activities.
Attack Chain
- Attacker authenticates to the Aero CMS application.
- Attacker crafts a malicious PHP file containing code to be executed on the server.
- Attacker accesses the
/admin/posts.phpendpoint with thesource=add_postparameter. - Attacker uploads the malicious PHP file through the
imageparameter in a POST request to/admin/posts.php. - The application saves the uploaded file to a directory accessible by the webserver.
- The attacker crafts a request to directly access the uploaded PHP file via HTTP.
- The webserver executes the PHP code within the uploaded file.
- Attacker achieves remote code execution on the server.
Impact
Successful exploitation of this vulnerability (CVE-2022-50944) allows an attacker to execute arbitrary PHP code on the server hosting Aero CMS 0.0.1. This could lead to complete compromise of the affected system, including the ability to read sensitive data, modify website content, install malware, or pivot to other systems on the network. The vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity. While the number of victims is unknown, any system running the vulnerable version of Aero CMS is at risk if authentication is compromised.
Recommendation
- Upgrade to a patched version of Aero CMS if available; otherwise, discontinue use of the product.
- Implement strict input validation on the
imageparameter to prevent the upload of PHP files to mitigate CVE-2022-50944. - Deploy the Sigma rule
Detect Suspicious PHP File Upload via Image Parameterto identify attempts to upload malicious PHP files to the/admin/posts.phpendpoint. - Monitor web server logs for suspicious requests to
/admin/posts.phpwith thesource=add_postparameter and PHP files uploaded through theimageparameter to identify potential exploitation attempts, as described in the attack chain.
Detection coverage 2
Detect Suspicious PHP File Upload via Image Parameter
highDetects CVE-2022-50944 exploitation — PHP file upload via the image parameter in the /admin/posts.php endpoint, indicating a potential PHP code injection attempt.
Detect Direct Access to Suspicious Uploaded PHP Files
mediumDetects attempts to directly access PHP files uploaded to the webserver, potentially indicating successful exploitation of CVE-2022-50944.
Detection queries are available on the platform. Get full rules →