CVE-2020-17563

9.1 CRITICAL

📋 TL;DR

CVE-2020-17563 is a path traversal vulnerability in FeiFeiCMS v4.0 that allows remote attackers to delete arbitrary files on the server by sending a specially crafted HTTP request to the admin template deletion endpoint. This affects all systems running FeiFeiCMS v4.0 with the vulnerable component exposed.

💻 Affected Systems

Products:
  • FeiFeiCMS
Versions: v4.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the admin template deletion endpoint to be accessible, which is typically exposed in default configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, leading to service disruption, data loss, or privilege escalation by removing authentication or configuration files.

🟠

Likely Case

Website defacement or disruption through deletion of web application files, templates, or configuration files, causing service unavailability.

🟢

If Mitigated

Limited impact if proper access controls restrict admin endpoints to authorized users only and file system permissions prevent deletion of critical files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires sending a crafted HTTP request to the vulnerable endpoint, but may need authentication depending on configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v4.0.1 or later

Vendor Advisory: Not publicly documented

Restart Required: No

Instructions:

1. Upgrade FeiFeiCMS to version 4.0.1 or later. 2. Replace the vulnerable files with patched versions from the official source. 3. Verify the fix by testing the affected endpoint.

🔧 Temporary Workarounds

Restrict Access to Admin Endpoints

all

Block access to the vulnerable admin template deletion endpoint using web server configuration or firewall rules.

# Apache: RewriteRule ^/index\.php\?s=/admin-tpl-del - [F]
# Nginx: location ~ /index\.php\?s=/admin-tpl-del { deny all; }

Implement Input Validation

all

Add server-side validation to sanitize the 'id' parameter in the admin template deletion function to prevent path traversal.

# Example PHP snippet to validate input: if (strpos($_GET['id'], '..') !== false) { die('Invalid input'); }

🧯 If You Can't Patch

  • Implement strict access controls to limit admin endpoints to trusted IP addresses only.
  • Monitor and audit file deletion activities on the server to detect exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Test by sending a crafted HTTP request to /index.php?s=/admin-tpl-del&id=../../../../etc/passwd and checking for file deletion or error responses.

Check Version:

Check the FeiFeiCMS version in the admin panel or by examining the application files for version identifiers.

Verify Fix Applied:

After patching, repeat the test request; it should return an error or no longer delete files outside the intended directory.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /index.php?s=/admin-tpl-del with suspicious 'id' parameters containing path traversal sequences (e.g., '..', '/')
  • File deletion events in system or application logs corresponding to admin template operations

Network Indicators:

  • Unusual HTTP traffic patterns to admin endpoints from untrusted sources
  • Requests with path traversal payloads in URL parameters

SIEM Query:

source="web_server_logs" AND url="/index.php?s=/admin-tpl-del" AND (id="*..*" OR id="*../*")

🔗 References

📤 Share & Export