<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>E-Cology 9.5 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/e-cology-9.5/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/e-cology-9.5/feed.xml" rel="self" type="application/rss+xml"/><item><title>Weaver E-cology Arbitrary File Read Vulnerability (CVE-2022-50992)</title><link>https://feed.craftedsignal.io/briefs/2024-01-weaver-file-read/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-weaver-file-read/</guid><description>Unauthenticated remote attackers can exploit an arbitrary file read vulnerability (CVE-2022-50992) in Weaver E-cology 9.5 versions prior to 10.52 via the XML-RPC endpoint to access sensitive files.</description><content:encoded><![CDATA[<p>Weaver (Fanwei) E-cology 9.5 versions prior to 10.52 are vulnerable to an arbitrary file read vulnerability (CVE-2022-50992) within the XmlRpcServlet interface. This vulnerability is located at the XML-RPC endpoint and allows unauthenticated remote attackers to read arbitrary files on the system. The attack leverages the <code>WorkflowService.getAttachment</code> and <code>WorkflowService.LoadTemplateProp</code> methods, which can be accessed without authentication, to supply file paths. Successful exploitation enables attackers to retrieve sensitive files, including system configuration files and database credentials, from the compromised server. Exploitation evidence was first observed by the Shadowserver Foundation on 2022-12-14 (UTC), highlighting active exploitation of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a Weaver E-cology 9.5 instance.</li>
<li>The attacker sends a crafted XML-RPC request to the XmlRpcServlet endpoint.</li>
<li>The request invokes either the <code>WorkflowService.getAttachment</code> or <code>WorkflowService.LoadTemplateProp</code> method.</li>
<li>The attacker includes a file path to a sensitive file (e.g., <code>/etc/passwd</code>, database configuration files) as a parameter in the XML-RPC request.</li>
<li>The vulnerable method processes the request without proper authentication or authorization checks.</li>
<li>The server reads the content of the specified file.</li>
<li>The server returns the file content in the XML-RPC response.</li>
<li>The attacker parses the response to extract the contents of the sensitive file, potentially gaining access to credentials or other sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2022-50992 allows unauthenticated attackers to read arbitrary files on the Weaver E-cology server. This can lead to the disclosure of sensitive information, such as system configuration files, database credentials, and other confidential data. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability. This vulnerability can lead to full system compromise if database credentials are leaked.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Weaver E-cology instances to version 10.52 or later to remediate CVE-2022-50992.</li>
<li>Deploy the Sigma rule <code>Detect Weaver E-cology File Read via XML-RPC</code> to identify exploitation attempts targeting the vulnerable XML-RPC endpoint.</li>
<li>Monitor web server logs for suspicious requests to the XmlRpcServlet endpoint, specifically those containing <code>WorkflowService.getAttachment</code> or <code>WorkflowService.LoadTemplateProp</code>, using the provided Sigma rule.</li>
<li>Implement network segmentation to limit the blast radius of a potential compromise and restrict access to sensitive internal resources.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>cve-2022-50992</category><category>file-read</category><category>vulnerability</category><category>webserver</category></item></channel></rss>