CVE-2020-21322

9.8 CRITICAL

📋 TL;DR

CVE-2020-21322 is an arbitrary file upload vulnerability in Feehi CMS that allows attackers to upload malicious PHP files. This can lead to remote code execution on affected systems. All Feehi CMS installations version 2.0.8 and below are vulnerable.

💻 Affected Systems

Products:
  • Feehi CMS
Versions: v2.0.8 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Any Feehi CMS installation with file upload functionality enabled is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the web server, data exfiltration, and lateral movement to other systems.

🟠

Likely Case

Webshell deployment leading to data theft, defacement, or use as part of a botnet.

🟢

If Mitigated

Attack blocked at web application firewall level or file upload validation prevents malicious uploads.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the CMS admin panel.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.0.9 and above

Vendor Advisory: https://github.com/liufee/cms/issues/44

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download the latest version from the official repository. 3. Replace all files except configuration and upload directories. 4. Verify functionality.

🔧 Temporary Workarounds

Disable file upload functionality

all

Temporarily disable file upload features in the CMS admin panel

Web server file type restrictions

linux

Configure web server to block execution of uploaded PHP files

For Apache: Add 'php_flag engine off' to .htaccess in upload directory
For Nginx: Add 'location ~ \.php$ { deny all; }' to upload directory config

🧯 If You Can't Patch

  • Implement strict file upload validation (whitelist allowed extensions, verify file signatures)
  • Deploy web application firewall with file upload protection rules

🔍 How to Verify

Check if Vulnerable:

Check CMS version in admin panel or via version.php file

Check Version:

grep -r 'version' /path/to/feehicms/version.php

Verify Fix Applied:

Verify version is 2.0.9 or higher and test file upload with PHP extension is rejected

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed file upload attempts
  • Successful upload of .php files to upload directories
  • Unusual admin panel login activity

Network Indicators:

  • POST requests to file upload endpoints with PHP content
  • Outbound connections from web server to unknown IPs

SIEM Query:

source="web_logs" AND (uri="/admin/upload" OR uri="/admin/file") AND (file_extension=".php" OR content_type="application/x-php")

🔗 References

📤 Share & Export