CVE-2012-5190
📋 TL;DR
Prizm Content Connect 5.1 contains an arbitrary file upload vulnerability that allows attackers to upload malicious files to the server. This affects all systems running the vulnerable version of this document viewing and conversion software. Successful exploitation can lead to complete system compromise.
💻 Affected Systems
- Prizm Content Connect
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, and lateral movement within the network
Likely Case
Webshell deployment allowing persistent access, data exfiltration, and further exploitation
If Mitigated
Limited impact if proper file upload validation and web application firewalls are in place
🎯 Exploit Status
Simple HTTP POST requests with malicious file uploads can exploit this vulnerability
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 5.2 or later
Vendor Advisory: https://www.accusoft.com/support/security-advisories/
Restart Required: Yes
Instructions:
1. Download Prizm Content Connect version 5.2 or later from Accusoft
2. Backup current configuration and data
3. Install the updated version following vendor instructions
4. Restart the Prizm Content Connect service
🔧 Temporary Workarounds
File Upload Restriction
allImplement strict file type validation and size limits on upload endpoints
Web Application Firewall Rules
allDeploy WAF rules to block malicious file upload patterns
🧯 If You Can't Patch
- Isolate the Prizm Content Connect server in a restricted network segment
- Implement strict network access controls and monitor all file upload activity
🔍 How to Verify
Check if Vulnerable:
Check Prizm Content Connect version in administration panel or configuration files
Check Version:
Check web interface or configuration files for version information
Verify Fix Applied:
Verify version is 5.2 or later and test file upload functionality with malicious payloads
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to Prizm endpoints
- Large or suspicious file types being uploaded
- POST requests to file upload endpoints with unusual parameters
Network Indicators:
- HTTP POST requests to upload endpoints with executable file extensions
- Unusual outbound connections from Prizm server
SIEM Query:
source="prizm_logs" AND (event="file_upload" AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp"))