Vulnerability Description
Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tribalsystems | Zenario | 9.2 |
Related Weaknesses (CWE)
References
- https://fluidattacks.com/advisories/simone/ExploitPatchThird Party Advisory
- https://github.com/TribalSystems/Zenario/releases/tag/9.2.55826PatchRelease NotesThird Party Advisory
- https://fluidattacks.com/advisories/simone/ExploitPatchThird Party Advisory
- https://github.com/TribalSystems/Zenario/releases/tag/9.2.55826PatchRelease NotesThird Party Advisory
FAQ
What is CVE-2022-23043?
CVE-2022-23043 is a vulnerability with a CVSS score of 7.2 (HIGH). Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, ...
How severe is CVE-2022-23043?
CVE-2022-23043 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-23043?
Check the references section above for vendor advisories and patch information. Affected products include: Tribalsystems Zenario.