Vulnerability Description
ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Impresscms | Impresscms | < 1.4.2 |
Related Weaknesses (CWE)
References
- https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fPatchThird Party Advisory
- https://github.com/ImpressCMS/impresscms/compare/1.4.1...v1.4.2PatchThird Party Advisory
- https://r0.haxors.org/posts?id=8ExploitThird Party Advisory
- https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fPatchThird Party Advisory
- https://github.com/ImpressCMS/impresscms/compare/1.4.1...v1.4.2PatchThird Party Advisory
- https://r0.haxors.org/posts?id=8ExploitThird Party Advisory
FAQ
What is CVE-2022-24977?
CVE-2022-24977 is a vulnerability with a CVSS score of 9.8 (CRITICAL). ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script....
How severe is CVE-2022-24977?
CVE-2022-24977 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-24977?
Check the references section above for vendor advisories and patch information. Affected products include: Impresscms Impresscms.