Plattform
php
Komponente
e107
Behoben in
3.2.2
CVE-2022-50939 is a critical Path Traversal vulnerability discovered in e107 CMS versions 3.2.1 through 3.2.1. This flaw allows authenticated administrators to overwrite arbitrary server files, potentially leading to complete compromise of the web application. The vulnerability stems from insufficient sanitization of the upload_caption parameter within the Media Manager's remote URL upload feature. A patch is required to address this issue.
The impact of CVE-2022-50939 is severe. An attacker with administrative privileges can leverage directory traversal sequences (e.g., ../../../) within the upload_caption field to overwrite critical system files outside the intended upload directory. This allows for arbitrary file modification, potentially enabling attackers to inject malicious code, modify configuration files, or even gain remote code execution. Successful exploitation could lead to complete control of the web server and the data it hosts. This vulnerability shares similarities with other path traversal exploits where attackers manipulate file paths to access unauthorized resources.
CVE-2022-50939 was published on 2026-01-13. Public proof-of-concept exploits are currently unknown, but the vulnerability's ease of exploitation makes it a potential target for automated scanning and exploitation. The CVSS score of 7.2 (HIGH) indicates a significant risk. It is recommended to prioritize remediation efforts to prevent potential exploitation.
e107 CMS installations running version 3.2.1 are directly at risk. Websites utilizing the Media Manager's remote URL upload feature, particularly those with administrative accounts that have weak passwords or are otherwise vulnerable to compromise, are especially susceptible. Shared hosting environments that run e107 CMS are also at increased risk, as a compromise of one site could potentially affect others on the same server.
• php: Examine web server access logs for requests to image.php with suspicious upload_caption parameters containing directory traversal sequences (e.g., ../../../).
• php: Review e107 CMS configuration files for any unusual modifications or unexpected file paths.
• generic web: Use curl to test the image.php endpoint with various upload_caption values containing directory traversal sequences to identify potential vulnerabilities.
curl -X POST -d "upload_caption=../../../etc/passwd" http://your-e107-site/image.phpdisclosure
Exploit-Status
EPSS
0.70% (72% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2022-50939 is to upgrade to a patched version of e107 CMS. As no fixed version is provided, review the e107 CMS website for the latest stable release and apply the update immediately. Until a patch is available, consider implementing temporary workarounds such as restricting file upload permissions for administrative users or implementing strict input validation on the upload_caption parameter. Web application firewalls (WAFs) configured to detect and block directory traversal attempts can also provide a layer of protection.
Actualice a una versión corregida de e107 CMS que solucione la vulnerabilidad de bypass de restricciones de carga. Verifique las notas de la versión y las instrucciones de actualización proporcionadas por el proveedor para garantizar una implementación correcta. Además, revise y fortalezca las prácticas de seguridad de la aplicación, incluyendo la validación y el saneamiento de todas las entradas del usuario.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2022-50939 is a critical Path Traversal vulnerability affecting e107 CMS versions 3.2.1–3.2.1, allowing authenticated administrators to overwrite server files.
If you are running e107 CMS version 3.2.1, you are potentially affected by this vulnerability. Upgrade to a patched version as soon as one is available.
The recommended fix is to upgrade to a patched version of e107 CMS. Until a patch is available, restrict access to the Media Manager and implement strict file upload validation.
While no active exploitation has been confirmed, the vulnerability's nature makes it likely that it will be targeted. Monitor security advisories and threat intelligence feeds.
Refer to the official e107 CMS website and security advisories for updates and information regarding this vulnerability.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.