<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Metasoft 美特软件 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/metasoft-%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 17 May 2026 14:18:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/metasoft-%E7%BE%8E%E7%89%B9%E8%BD%AF%E4%BB%B6/feed.xml" rel="self" type="application/rss+xml"/><item><title>Metasoft MetaCRM Unrestricted File Upload Vulnerability (CVE-2026-8758)</title><link>https://feed.craftedsignal.io/briefs/2026-05-metasoft-metacrm-upload/</link><pubDate>Sun, 17 May 2026 14:18:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-metasoft-metacrm-upload/</guid><description>A vulnerability in Metasoft MetaCRM up to version 6.4.0 Beta06 allows for unrestricted file upload due to manipulation of the 'File' argument in the /common/jsp/upload3.jsp file, potentially leading to arbitrary code execution.</description><content:encoded><![CDATA[<p>Metasoft 美特软件 MetaCRM, a customer relationship management system, is vulnerable to an unrestricted file upload vulnerability (CVE-2026-8758) affecting versions up to 6.4.0 Beta06. The vulnerability resides in the <code>/common/jsp/upload3.jsp</code> file, and successful exploitation allows an unauthenticated attacker to upload arbitrary files to the server. Publicly available exploits exist, increasing the risk of active exploitation. The vendor was notified but did not respond. This vulnerability can lead to arbitrary code execution, data breaches, and full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a MetaCRM instance running a vulnerable version (&lt;= 6.4.0 Beta06).</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>/common/jsp/upload3.jsp</code> endpoint.</li>
<li>The attacker manipulates the <code>File</code> argument within the request, potentially using techniques to bypass file type restrictions (e.g., double extensions, null byte injection).</li>
<li>The server processes the request without proper validation, allowing the attacker to upload a file containing malicious code (e.g., a JSP webshell).</li>
<li>The attacker accesses the uploaded file via a direct HTTP request to its location on the server.</li>
<li>The server executes the malicious code within the uploaded file, granting the attacker arbitrary code execution.</li>
<li>The attacker establishes persistence by, for example, writing a startup script or modifying system configuration files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-8758 allows an unauthenticated remote attacker to upload arbitrary files, leading to arbitrary code execution on the affected MetaCRM server. This can result in complete system compromise, data breaches, and denial of service. Given that CRM systems often contain sensitive customer data, a successful attack could have significant financial and reputational consequences.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of MetaCRM that addresses CVE-2026-8758; apply available patches immediately to MetaCRM instances.</li>
<li>Deploy the Sigma rule provided below to detect exploitation attempts against <code>/common/jsp/upload3.jsp</code>.</li>
<li>Implement file upload restrictions and validation on the server side to prevent the upload of malicious file types.</li>
<li>Monitor web server logs for suspicious activity, including requests to <code>/common/jsp/upload3.jsp</code> with unusual parameters.</li>
<li>Implement network segmentation to limit the impact of a successful compromise on other systems.</li>
<li>Review and enforce principle of least privilege on the MetaCRM system, restricting file upload access to authorized users only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>unrestricted-upload</category><category>rce</category><category>web-application</category></item></channel></rss>