CVE-2021-26794

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious PHP files through the upload.php script in FrogCMS SentCMS, leading to remote code execution and privilege escalation. Any organization running vulnerable versions of FrogCMS SentCMS is affected, particularly those with internet-facing installations.

💻 Affected Systems

Products:
  • FrogCMS SentCMS
Versions: v0.9.5 and possibly earlier versions
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations with upload.php accessible. Any system using vulnerable FrogCMS SentCMS versions is at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the web server, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Webshell deployment allowing persistent access, data exfiltration, and further exploitation of the compromised system.

🟢

If Mitigated

Attack blocked at web application firewall level or file upload restrictions preventing PHP execution.

🌐 Internet-Facing: HIGH - Directly exploitable via HTTP requests without authentication, making internet-facing instances prime targets.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or through compromised internal systems, but requires network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple file upload vulnerability requiring only HTTP POST requests. Public GitHub issues demonstrate the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.9.6 or later

Vendor Advisory: https://github.com/philippe/FrogCMS/issues/11

Restart Required: No

Instructions:

1. Backup current installation. 2. Download latest version from official repository. 3. Replace upload.php with patched version. 4. Verify file upload restrictions are properly implemented.

🔧 Temporary Workarounds

Disable upload.php

linux

Temporarily disable or remove the vulnerable upload.php script

mv upload.php upload.php.disabled
chmod 000 upload.php

Restrict file uploads

all

Configure web server to block PHP file uploads via upload.php

Add 'Deny from all' to .htaccess for upload.php directory

🧯 If You Can't Patch

  • Implement strict file upload validation at web application firewall level
  • Disable PHP execution in upload directories using server configuration

🔍 How to Verify

Check if Vulnerable:

Check if upload.php exists and allows PHP file uploads without proper validation. Test by attempting to upload a PHP file.

Check Version:

Check FrogCMS version in admin panel or read version file if present

Verify Fix Applied:

Attempt to upload a PHP file through upload.php - should be rejected. Verify upload.php has proper file type validation.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed/successful file upload attempts to upload.php
  • PHP file uploads through upload.php endpoint
  • Unusual POST requests to upload.php

Network Indicators:

  • HTTP POST requests to /upload.php with PHP file content
  • Unusual outbound connections from web server after file upload

SIEM Query:

source="web_logs" AND uri="/upload.php" AND (method="POST" OR file_extension="php")

🔗 References

📤 Share & Export