CVE-2018-11091

9.9 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious files to MyBiz MyProcureNet servers by manipulating the whitelist parameter. Attackers can upload scripts that execute operating system commands, potentially leading to server takeover. This affects MyBiz MyProcureNet version 5.0.0 installations.

💻 Affected Systems

Products:
  • MyBiz MyProcureNet
Versions: 5.0.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations where file upload functionality is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise with remote code execution, data theft, and lateral movement within the network.

🟠

Likely Case

Webshell deployment leading to persistent backdoor access, data exfiltration, and further exploitation.

🟢

If Mitigated

Limited impact with proper file upload validation and server hardening in place.

🌐 Internet-Facing: HIGH - Directly exploitable via web interface without authentication.
🏢 Internal Only: MEDIUM - Requires internal network access but still exploitable.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward - attackers can modify the HiddenFieldControlCustomWhiteListedExtensions parameter to add malicious file extensions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.1 or later

Vendor Advisory: https://www.sec-consult.com/en/blog/advisories/arbitrary-file-upload-cross-site-scripting-in-mybiz-myprocurenet/

Restart Required: Yes

Instructions:

1. Download the latest version from MyBiz vendor portal. 2. Backup current installation. 3. Apply the patch/upgrade. 4. Restart the application server. 5. Verify the fix by testing file upload functionality.

🔧 Temporary Workarounds

Disable file upload functionality

all

Temporarily disable file upload features in MyProcureNet configuration

Edit web.config or application configuration to remove/disable upload modules

Implement WAF rules

all

Add web application firewall rules to block malicious file upload attempts

Add WAF rule: Block requests containing 'HiddenFieldControlCustomWhiteListedExtensions' parameter with suspicious values

🧯 If You Can't Patch

  • Implement strict file extension validation at the application layer
  • Deploy the application behind a reverse proxy with strict upload filtering

🔍 How to Verify

Check if Vulnerable:

Test if you can upload files with extensions like .asp, .php, .jsp by modifying the HiddenFieldControlCustomWhiteListedExtensions parameter

Check Version:

Check application version in admin panel or via application metadata

Verify Fix Applied:

Attempt the same exploit after patching - should be blocked or rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with executable extensions
  • Requests containing 'HiddenFieldControlCustomWhiteListedExtensions' parameter modifications
  • Webshell access patterns in access logs

Network Indicators:

  • POST requests to upload endpoints with unusual file extensions
  • Traffic to unexpected ports from web server

SIEM Query:

source="web_logs" AND (uri_path="*upload*" AND (file_extension="asp" OR file_extension="php" OR file_extension="jsp"))

🔗 References

📤 Share & Export