CVE-2022-1345

9.0 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious SVG files containing JavaScript to the Organizr web application, which then executes in users' browsers when viewed. It affects all users of Organizr versions prior to 2.1.1810. Successful exploitation can lead to session hijacking, data theft, and complete compromise of user accounts.

💻 Affected Systems

Products:
  • Organizr
Versions: All versions prior to 2.1.1810
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with file upload functionality enabled, which is default in Organizr.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access, steal all user sessions and credentials, modify application data, and establish persistent backdoors.

🟠

Likely Case

Session hijacking leading to unauthorized access to user accounts, data exfiltration, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper input validation and file upload restrictions, potentially only affecting individual user sessions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (viewing the malicious SVG) but the attack vector is simple and well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.1810

Vendor Advisory: https://github.com/causefx/organizr/commit/a09d834d995599756b62016af7026d2408ecf43a

Restart Required: Yes

Instructions:

1. Backup your current Organizr installation. 2. Update to version 2.1.1810 or later via git pull or manual download. 3. Restart the Organizr service. 4. Verify the fix by checking the version.

🔧 Temporary Workarounds

Disable SVG uploads

all

Configure Organizr to block SVG file uploads entirely

Modify Organizr configuration to remove 'svg' from allowed file types

Implement Content Security Policy

all

Add CSP headers to prevent script execution from uploaded files

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to web server configuration

🧯 If You Can't Patch

  • Disable file upload functionality completely in Organizr settings
  • Implement WAF rules to block SVG files with script tags and monitor for upload attempts

🔍 How to Verify

Check if Vulnerable:

Check if Organizr version is below 2.1.1810 in the web interface or configuration files

Check Version:

Check Organizr web interface dashboard or config.php for version information

Verify Fix Applied:

Confirm version is 2.1.1810 or higher and test SVG upload with script tags (should be blocked or sanitized)

📡 Detection & Monitoring

Log Indicators:

  • SVG file uploads containing script tags, JavaScript execution in file upload logs
  • Unusual user activity following file uploads

Network Indicators:

  • HTTP POST requests with SVG files containing script content
  • Outbound connections to suspicious domains after SVG upload

SIEM Query:

source="organizr.log" AND ("svg" AND ("script" OR "javascript" OR "onload"))

🔗 References

📤 Share & Export