CVE-2021-46386

9.8 CRITICAL

📋 TL;DR

This CVE describes a critical file upload vulnerability in mingSoft MCMS content management system that allows remote attackers to upload malicious JSPX webshell files. Attackers can execute arbitrary code on affected servers, potentially leading to complete system compromise. All organizations running MCMS versions through 5.2.5 are affected.

💻 Affected Systems

Products:
  • mingSoft MCMS
Versions: through 5.2.5
Operating Systems: All platforms running Java web applications
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with the vulnerable FileAction#upload endpoint accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with administrative access, data exfiltration, ransomware deployment, and lateral movement to other systems in the network.

🟠

Likely Case

Webshell installation leading to persistent backdoor access, data theft, and use of compromised server for further attacks.

🟢

If Mitigated

Attack blocked at web application firewall level with no file uploads reaching vulnerable endpoint.

🌐 Internet-Facing: HIGH - This is a web application vulnerability that can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could exploit this if they have network access to the MCMS instance.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request with crafted JSPX file to upload endpoint. Public exploit details available in the referenced issues.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.2.6 or later

Vendor Advisory: https://gitee.com/mingSoft/MCMS/issues/I4R0GW

Restart Required: Yes

Instructions:

1. Backup current installation and database. 2. Download MCMS version 5.2.6 or later from official repository. 3. Replace vulnerable files with patched version. 4. Restart the Java application server. 5. Verify the upload functionality is properly secured.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block requests to the vulnerable upload endpoint at network perimeter.

WAF rule: Block POST requests to */net/mingsoft/basic/action/web/FileAction#upload* containing .jspx files

File Upload Restriction

all

Configure server to reject JSPX file uploads at application level.

Add file extension filter in web.xml or application configuration to block .jspx uploads

🧯 If You Can't Patch

  • Implement strict file upload validation allowing only whitelisted file types
  • Deploy network segmentation to isolate MCMS instance from critical systems

🔍 How to Verify

Check if Vulnerable:

Check MCMS version in admin panel or by examining application files. Versions 5.2.5 and earlier are vulnerable.

Check Version:

Check WEB-INF/classes/application.properties or admin interface for version information

Verify Fix Applied:

Attempt to upload a JSPX file to the upload endpoint - should be rejected with proper validation. Verify version is 5.2.6 or later.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to FileAction#upload endpoint with .jspx files
  • Unusual file creation in web application directories
  • Java process spawning unexpected child processes

Network Indicators:

  • Outbound connections from web server to unknown IPs
  • Unusual traffic patterns from MCMS server

SIEM Query:

source="web_server" AND (url="*FileAction#upload*" AND file_extension="jspx")

🔗 References

📤 Share & Export