CVE-2018-14334

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload arbitrary PHP files to joyplus-cms 1.6.0 due to improper file extension validation. Attackers can execute malicious code on the server, potentially gaining full control. All systems running joyplus-cms 1.6.0 with the upload functionality accessible are affected.

💻 Affected Systems

Products:
  • joyplus-cms
Versions: 1.6.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires upload.php functionality to be accessible, which is typically enabled in default installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data theft, ransomware deployment, or use as a foothold for lateral movement.

🟠

Likely Case

Webshell upload allowing remote code execution, data exfiltration, and further system exploitation.

🟢

If Mitigated

Attack blocked at web application firewall or file upload prevented by proper validation.

🌐 Internet-Facing: HIGH - Directly exploitable via web interface without authentication.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple file upload bypass with publicly available proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: https://github.com/joyplus/joyplus-cms/issues/428

Restart Required: No

Instructions:

No official patch exists. Upgrade to a different CMS or apply manual fixes.

🔧 Temporary Workarounds

Disable upload.php

linux

Remove or restrict access to the vulnerable upload.php file.

mv manager/editor/upload.php manager/editor/upload.php.disabled
chmod 000 manager/editor/upload.php

Implement file validation

all

Add proper file extension validation and content checking to upload.php.

🧯 If You Can't Patch

  • Implement strict file upload restrictions at web server level (e.g., .htaccess rules blocking .php uploads)
  • Deploy web application firewall with file upload protection rules

🔍 How to Verify

Check if Vulnerable:

Check if joyplus-cms version is 1.6.0 and upload.php exists at manager/editor/upload.php

Check Version:

Check CMS version in configuration files or admin panel

Verify Fix Applied:

Test file upload functionality with PHP files - should be rejected with proper validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to upload.php
  • PHP file uploads with suspicious names
  • Multiple failed upload attempts

Network Indicators:

  • POST requests to upload.php with PHP file content
  • Unusual outbound connections after file upload

SIEM Query:

source="web.log" AND uri="/manager/editor/upload.php" AND (file_extension="php" OR content_type="application/x-php")

🔗 References

📤 Share & Export