CVE-2021-33353

9.8 CRITICAL

📋 TL;DR

This CVE describes a directory traversal vulnerability in Wyomind Help Desk Magento 2 extension that allows attackers to execute arbitrary code via file attachment directory settings. Attackers can exploit this to upload malicious files outside intended directories, potentially leading to remote code execution. All Magento 2 installations using Wyomind Help Desk extension versions 1.3.6 and earlier are affected.

💻 Affected Systems

Products:
  • Wyomind Help Desk Magento 2 extension
Versions: 1.3.6 and earlier
Operating Systems: All platforms running Magento 2
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Magento 2 installations with the Wyomind Help Desk extension installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise with attacker gaining full control over the Magento installation and underlying server, potentially leading to data theft, ransomware deployment, or use as a foothold for lateral movement.

🟠

Likely Case

Remote code execution allowing attackers to deface websites, steal customer data, install backdoors, or deploy cryptocurrency miners.

🟢

If Mitigated

Limited impact with proper file system permissions and web application firewalls blocking traversal attempts, potentially resulting only in failed exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires attacker access to file attachment functionality, which typically requires some level of authentication or access to the help desk interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.7

Vendor Advisory: https://www.wyomind.com/magento2/helpdesk-magento-2.html

Restart Required: No

Instructions:

1. Log into Magento admin panel. 2. Navigate to System > Web Setup Wizard > Extension Manager. 3. Search for Wyomind Help Desk. 4. Update to version 1.3.7 or later. 5. Clear Magento cache via System > Cache Management.

🔧 Temporary Workarounds

Disable extension

linux

Temporarily disable the Wyomind Help Desk extension until patching is possible

php bin/magento module:disable Wyomind_HelpDesk

Restrict file upload directory permissions

linux

Set strict permissions on Magento's media and var directories to prevent file execution

chmod 755 pub/media
chmod 755 var
find pub/media -type f -name '*.php' -exec chmod 644 {} \;
find var -type f -name '*.php' -exec chmod 644 {} \;

🧯 If You Can't Patch

  • Implement web application firewall rules to block directory traversal patterns in file upload requests
  • Disable file attachment functionality in the Help Desk extension configuration

🔍 How to Verify

Check if Vulnerable:

Check installed extension version via Magento admin panel: Stores > Configuration > Advanced > Advanced > Wyomind Help Desk

Check Version:

php bin/magento module:status | grep Wyomind_HelpDesk

Verify Fix Applied:

Verify extension version shows 1.3.7 or later in Magento admin panel and test file upload functionality with traversal attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to non-standard directories in Magento logs
  • Multiple failed file upload attempts with directory traversal patterns
  • PHP file executions from unexpected locations in web server logs

Network Indicators:

  • HTTP POST requests to file upload endpoints containing '../' or similar traversal sequences
  • Unusual outbound connections from Magento server following file uploads

SIEM Query:

source="magento.log" AND ("../" OR "..\\" OR "%2e%2e%2f") AND "upload"

🔗 References

📤 Share & Export