CVE-2022-24977
PHP vulnerability analysis and mitigation

Overview

ImpressCMS versions before 1.4.2 contained a critical vulnerability (CVE-2022-24977) that allowed unauthenticated remote code execution through directory traversal in origName or imageName parameters. The vulnerability was discovered in October 2020 and affected the CKeditor image processor component (R0 Haxors).

Technical details

The vulnerability existed in the processImage.php file within the CKeditor component. The issue stemmed from insufficient filtering of user-supplied image paths, where the str_replace function was used non-recursively to filter '../' and './' sequences. This allowed attackers to bypass the protection using patterns like '.....///' which would resolve to '../' after filtering. The vulnerability could be triggered through the 'undo' and 'save' actions in the image editor functionality (R0 Haxors).

Impact

The vulnerability allowed unauthenticated attackers to perform arbitrary file copy operations and achieve remote code execution on affected systems. This gave attackers complete control over vulnerable ImpressCMS installations without requiring any authentication (R0 Haxors).

Mitigation and workarounds

The vulnerability was patched in ImpressCMS version 1.4.2 pre-release (December 2020) and version 2.0.0 alpha 11 (October 2021). Users should upgrade to these or newer versions to protect against this vulnerability (R0 Haxors, GitHub ImpressCMS).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management