CVE-2021-46037
📋 TL;DR
MCMS v5.2.4 contains an arbitrary file deletion vulnerability in the /template/unzip.do component that allows attackers to delete files on the server. This affects all systems running MCMS v5.2.4 with the vulnerable component accessible. Attackers can potentially delete critical system files, configuration files, or application data.
💻 Affected Systems
- MCMS
📦 What is this software?
Mcms by Mingsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through deletion of critical operating system files, leading to system crash, data loss, or service disruption that requires full system restoration.
Likely Case
Application disruption through deletion of configuration files, templates, or user data, causing service outages and potential data loss requiring restoration from backups.
If Mitigated
Limited impact if proper access controls and file permissions are configured, restricting deletion to non-critical application files only.
🎯 Exploit Status
Exploitation requires access to the vulnerable endpoint but is technically simple once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v5.2.5 or later
Vendor Advisory: https://github.com/ming-soft/MCMS
Restart Required: Yes
Instructions:
1. Backup current installation and data. 2. Download latest MCMS version from official repository. 3. Replace vulnerable files with patched version. 4. Restart application server. 5. Verify fix by testing /template/unzip.do endpoint.
🔧 Temporary Workarounds
Block Vulnerable Endpoint
allRestrict access to /template/unzip.do endpoint using web server configuration or firewall rules.
# Apache: RewriteRule ^/template/unzip\.do$ - [F]
# Nginx: location ~ ^/template/unzip\.do$ { return 403; }
File Permission Restriction
linuxSet restrictive permissions on critical directories to prevent deletion.
chmod 755 /path/to/mcms/template
chown root:root /path/to/mcms/template
🧯 If You Can't Patch
- Implement strict network segmentation to isolate MCMS instance from critical systems.
- Deploy web application firewall (WAF) with rules to block file deletion patterns.
🔍 How to Verify
Check if Vulnerable:
Check if /template/unzip.do endpoint is accessible and responds to file deletion requests. Review application logs for unauthorized access attempts.
Check Version:
Check MCMS version in application configuration files or admin panel.
Verify Fix Applied:
Test /template/unzip.do endpoint with file deletion attempts; should return error or be inaccessible. Verify MCMS version is v5.2.5 or later.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /template/unzip.do with file deletion parameters
- File deletion events in system logs from MCMS process
- Error logs showing file not found after deletion attempts
Network Indicators:
- HTTP POST requests to /template/unzip.do endpoint
- Unusual file deletion patterns from MCMS server
SIEM Query:
source="web_server" AND uri="/template/unzip.do" AND (method="POST" OR method="DELETE")