CVE-2020-37117

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated administrators in jizhiCMS 1.6.7 to download arbitrary files from the server by exploiting the admin plugins update endpoint. Attackers can craft POST requests with malicious parameters to access sensitive system files. Only jizhiCMS installations with administrator accounts are affected.

💻 Affected Systems

Products:
  • jizhiCMS
Versions: 1.6.7
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrator access to exploit. All default installations of jizhiCMS 1.6.7 are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise through downloading sensitive files like /etc/passwd, SSH keys, database credentials, or configuration files containing secrets.

🟠

Likely Case

Data exfiltration of sensitive information, credential theft, and potential privilege escalation to full system access.

🟢

If Mitigated

Limited impact if proper access controls, file permissions, and network segmentation are in place to restrict administrator privileges.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available on Exploit-DB. Requires administrator credentials but exploitation is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.8 or later

Vendor Advisory: https://www.jizhicms.cn/

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download jizhiCMS 1.6.8 or later from the official website. 3. Replace vulnerable files with patched versions. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrator account access to trusted IP addresses only

# Configure web server (Apache/Nginx) to restrict /admin/ path to specific IPs
# Example Apache: Require ip 192.168.1.0/24
# Example Nginx: allow 192.168.1.0/24; deny all;

File Permission Hardening

linux

Set strict file permissions on sensitive directories

chmod 600 /path/to/sensitive/files
chown root:root /etc/passwd /etc/shadow
chmod 000 /etc/shadow

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate jizhiCMS from sensitive systems
  • Enable detailed logging and monitoring of all admin panel activities and file access attempts

🔍 How to Verify

Check if Vulnerable:

Check if running jizhiCMS version 1.6.7. Review admin panel access logs for suspicious POST requests to plugins update endpoint with filepath/download_url parameters.

Check Version:

Check jizhiCMS configuration files or admin panel for version information

Verify Fix Applied:

Verify version is 1.6.8 or later. Test that arbitrary file downloads via the plugins update endpoint are no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • POST requests to /admin/plugins/update with filepath or download_url parameters
  • Unusual file access patterns from admin accounts
  • Large file downloads from admin interface

Network Indicators:

  • Unexpected outbound traffic from jizhiCMS server following admin panel access
  • Traffic patterns indicating file exfiltration

SIEM Query:

source="web_logs" AND (uri_path="/admin/plugins/update" AND method="POST") AND (params CONTAINS "filepath" OR params CONTAINS "download_url")

🔗 References

📤 Share & Export