CVE-2020-22643

7.2 HIGH

📋 TL;DR

Feehi CMS 2.1.0 contains an arbitrary file upload vulnerability that allows authenticated administrators to upload malicious files. This can lead to remote code execution on the web server. Only systems running Feehi CMS 2.1.0 with administrator access are affected.

💻 Affected Systems

Products:
  • Feehi CMS
Versions: 2.1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator authentication to access the vulnerable upload functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through remote code execution, allowing attacker to steal data, install malware, or pivot to other systems.

🟠

Likely Case

Webshell deployment leading to data exfiltration, defacement, or further exploitation of the server.

🟢

If Mitigated

Limited impact if file uploads are restricted to non-executable directories with proper permissions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.1 or later

Vendor Advisory: https://github.com/liufee/cms/issues/51

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download and install Feehi CMS 2.1.1 or later. 3. Verify the update was successful.

🔧 Temporary Workarounds

Restrict file upload extensions

all

Configure web server to only allow image file extensions (jpg, png, gif) in upload directories.

# Apache: Add to .htaccess in upload directory
<FilesMatch "\.(php|php3|php4|php5|phtml|pl|py|jsp|asp|htm|html|shtml|sh|cgi)$">
  Order Allow,Deny
  Deny from all
</FilesMatch>
# Nginx: Add to server block
location ~* \.(php|php3|php4|php5|phtml|pl|py|jsp|asp|htm|html|shtml|sh|cgi)$ {
  deny all;
}

Disable administrator image upload

all

Temporarily disable the vulnerable image upload functionality in the admin panel.

# Modify CMS code to remove or disable upload functionality

🧯 If You Can't Patch

  • Implement strict file upload validation on the web application layer.
  • Restrict upload directory permissions to prevent execution of uploaded files.

🔍 How to Verify

Check if Vulnerable:

Check if running Feehi CMS version 2.1.0 and verify administrator image upload functionality exists.

Check Version:

Check CMS admin panel or read version file in installation directory.

Verify Fix Applied:

Confirm version is 2.1.1 or later and test that malicious file uploads are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to admin image upload endpoint
  • Files with executable extensions in upload directories
  • Multiple failed upload attempts

Network Indicators:

  • POST requests to admin upload endpoints with unusual file types
  • Subsequent requests to uploaded files with executable extensions

SIEM Query:

source="web_logs" AND (uri="/admin/upload" OR uri="/admin/image/upload") AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp")

🔗 References

📤 Share & Export