<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2022-50993 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2022-50993/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2022-50993/feed.xml" rel="self" type="application/rss+xml"/><item><title>Weaver E-office Unauthenticated Arbitrary File Upload Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-weaver-eoffice-upload/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-weaver-eoffice-upload/</guid><description>Weaver E-office versions prior to 10.0_20221201 are vulnerable to unauthenticated arbitrary file upload in the OfficeServer.php endpoint, allowing attackers to upload PHP webshells and achieve remote code execution.</description><content:encoded><![CDATA[<p>Weaver E-office, a web-based office automation system, is vulnerable to an unauthenticated arbitrary file upload vulnerability (CVE-2022-50993) affecting versions prior to 10.0_20221201. The vulnerability exists within the <code>OfficeServer.php</code> endpoint, allowing remote attackers to upload arbitrary files without authentication. This is achieved by sending multipart POST requests with manipulated filenames and content types. The Shadowserver Foundation observed initial exploitation evidence on October 10, 2022. Successful exploitation enables attackers to upload malicious PHP webshells to the Document directory and execute them via HTTP GET requests, leading to remote code execution on the affected server as the web server user. This can compromise the confidentiality, integrity, and availability of the E-office system and the underlying server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a crafted HTTP POST request to the <code>OfficeServer.php</code> endpoint.</li>
<li>The POST request includes a multipart form with a file upload field.</li>
<li>The attacker sets an arbitrary filename for the uploaded file, typically with a <code>.php</code> extension.</li>
<li>The attacker disguises the content type of the uploaded file to bypass basic server-side checks.</li>
<li>The server saves the uploaded file (a PHP webshell) to the Document directory.</li>
<li>The attacker sends an HTTP GET request to the uploaded PHP webshell file.</li>
<li>The web server executes the PHP code within the uploaded file.</li>
<li>The attacker achieves remote code execution as the web server user, enabling further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2022-50993 allows an unauthenticated attacker to execute arbitrary code on the affected Weaver E-office server. This can lead to complete system compromise, data theft, modification of sensitive data, and disruption of services. The vulnerability has a CVSS v3.1 base score of 9.8, indicating its critical severity. While the number of victims and specific sectors targeted are not detailed, organizations using vulnerable versions of Weaver E-office are at high risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Weaver E-office to version 10.0_20221201 or later to patch CVE-2022-50993.</li>
<li>Deploy the Sigma rule &ldquo;Detect Weaver E-office Webshell Upload&rdquo; to detect malicious PHP file uploads to the <code>OfficeServer.php</code> endpoint.</li>
<li>Monitor web server access logs for requests to the Document directory with <code>.php</code> extensions, indicative of webshell execution.</li>
<li>Implement web application firewall (WAF) rules to block suspicious POST requests to <code>OfficeServer.php</code> with arbitrary file upload attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2022-50993</category><category>file-upload</category><category>webshell</category><category>rce</category><category>e-office</category></item></channel></rss>