CVE-2021-37764

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to delete arbitrary files on XOS-Shop systems by manipulating the current_manufacturer_image parameter in the manufacturers.php admin endpoint. Attackers can delete critical system files, potentially causing service disruption or complete system compromise. Only XOS-Shop xos_shop_system version 1.0.9 installations are affected.

💻 Affected Systems

Products:
  • XOS-Shop xos_shop_system
Versions: 1.0.9
Operating Systems: All operating systems running XOS-Shop
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin access to the manufacturers.php endpoint. The vulnerability exists in the default installation configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, leading to data loss, service disruption, and potential privilege escalation.

🟠

Likely Case

Service disruption through deletion of application files, configuration files, or database files, causing website downtime and data loss.

🟢

If Mitigated

Limited impact if proper file permissions and access controls prevent deletion of critical system files.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is accessible via web interface, making internet-facing installations particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but have reduced attack surface compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin access to the vulnerable endpoint. The vulnerability is well-documented in public repositories with proof-of-concept details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.10 or later

Vendor Advisory: https://github.com/XOS-Shop/xos_shop_system/issues/1

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download the latest version from the official repository. 3. Replace the vulnerable files with patched versions. 4. Verify the fix by testing the manufacturers.php endpoint.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit access to the /shop/admin/manufacturers.php endpoint to trusted IP addresses only.

# Add to .htaccess or web server config
Deny from all
Allow from 192.168.1.0/24

File Permission Hardening

linux

Set restrictive file permissions on critical system directories to prevent deletion.

# Linux command example
chmod 755 /var/www/html/shop/admin/
chmod 644 /var/www/html/shop/admin/manufacturers.php

🧯 If You Can't Patch

  • Implement strict access controls to limit who can access the admin interface
  • Deploy a web application firewall (WAF) with rules to block malicious parameter manipulation

🔍 How to Verify

Check if Vulnerable:

Check if your XOS-Shop installation is version 1.0.9 by examining the version file or checking the admin panel version information.

Check Version:

Check the version.php file or admin panel: cat /path/to/xos-shop/version.php | grep 'version'

Verify Fix Applied:

After patching, attempt to reproduce the vulnerability by testing the current_manufacturer_image parameter manipulation. Verify the system no longer allows arbitrary file deletion.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in system logs
  • Multiple failed attempts to access manufacturers.php with manipulated parameters
  • Admin panel access from unusual IP addresses

Network Indicators:

  • HTTP POST requests to /shop/admin/manufacturers.php with current_manufacturer_image parameter containing path traversal sequences

SIEM Query:

source="web_logs" AND uri="/shop/admin/manufacturers.php" AND (param="current_manufacturer_image" AND value CONTAINS "../")

🔗 References

📤 Share & Export