ImpressCMS 1.4.2 Remote Code Execution via Autotasks Interface (CVE-2021-47938)
ImpressCMS 1.4.2 is vulnerable to remote code execution (RCE) via the autotasks administrative interface, where authenticated attackers can inject malicious PHP code into the sat_code parameter via a POST request to /modules/system/admin.php, leading to arbitrary PHP code execution through GET parameters (CVE-2021-47938).
ImpressCMS 1.4.2 is susceptible to a remote code execution vulnerability, identified as CVE-2021-47938, within the autotasks administrative interface. This flaw allows authenticated attackers to inject arbitrary PHP code by manipulating the sat_code parameter. Successful exploitation allows attackers to execute arbitrary PHP commands on the targeted system, potentially leading to full system compromise. This vulnerability requires authentication, limiting the scope of potential attackers to those with valid credentials or those who can bypass authentication mechanisms. Defenders need to ensure proper input validation and access controls to prevent unauthorized code injection.
Attack Chain
- Attacker authenticates to the ImpressCMS application.
- Attacker crafts a malicious POST request targeting
/modules/system/admin.php?fct=autotasks&op=mod. - The POST request includes the
sat_codeparameter containing malicious PHP code. - The application improperly processes the
sat_codeparameter, leading to code injection. - The injected code creates an executable file on the server.
- The attacker triggers execution of the created file via a GET request.
- Arbitrary PHP code is executed on the server.
- The attacker achieves remote code execution, potentially leading to further compromise of the system.
Impact
Successful exploitation of CVE-2021-47938 allows attackers to execute arbitrary PHP code on the ImpressCMS server. This can lead to complete compromise of the application and the underlying system, including data theft, website defacement, or further propagation of attacks within the network. Given the high CVSS score of 8.8, this vulnerability poses a significant risk to organizations using the affected version of ImpressCMS.
Recommendation
- Apply appropriate input validation and sanitization to all user-supplied data, especially the
sat_codeparameter, to prevent code injection (CVE-2021-47938). - Implement the Sigma rule provided to detect malicious POST requests to
/modules/system/admin.phpwith suspicious content in thesat_codeparameter. - Ensure that the ImpressCMS application is running with least privilege to limit the impact of successful code execution.
Detection coverage 2
Detects CVE-2021-47938 Exploitation — ImpressCMS Autotasks RCE Attempt
highDetects CVE-2021-47938 exploitation — HTTP POST requests to /modules/system/admin.php with suspicious PHP code injection attempts in the sat_code parameter
Detects CVE-2021-47938 Exploitation — ImpressCMS Autotasks RCE Webshell Access
highDetects CVE-2021-47938 exploitation — HTTP GET requests accessing potential webshell file created via sat_code
Detection queries are available on the platform. Get full rules →