CVE-2022-22914

7.5 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers in Ovidentia CMS 6.0 to perform path traversal attacks through the FileManager component, enabling unauthorized viewing and downloading of files from the upload directory. It affects any Ovidentia CMS 6.0 installation with authenticated user access. The issue stems from improper access control that fails to validate file paths.

💻 Affected Systems

Products:
  • Ovidentia CMS
Versions: 6.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access. The vulnerability exists in the FileManager component specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate sensitive files from the upload directory, potentially including confidential documents, user-uploaded private content, or system files if directory permissions allow traversal beyond intended boundaries.

🟠

Likely Case

Authenticated users can access files they shouldn't have permission to view, leading to information disclosure of uploaded content that may contain sensitive business or user data.

🟢

If Mitigated

With proper file system permissions restricting access to upload directories and web server configuration limiting directory traversal, impact would be limited to files already accessible through normal application functions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via path traversal techniques. Public proof-of-concept exists in the referenced GitLab repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://ovidentia.com

Restart Required: No

Instructions:

Check Ovidentia website for security updates. Since this is version 6.0, upgrading to a newer supported version may be required if available.

🔧 Temporary Workarounds

Restrict FileManager Access

all

Disable or restrict access to the FileManager component for non-admin users

Implement Web Application Firewall Rules

all

Block path traversal patterns in requests to FileManager endpoints

🧯 If You Can't Patch

  • Implement strict file system permissions on upload directories to prevent unauthorized access
  • Monitor FileManager access logs for path traversal patterns and investigate suspicious activity

🔍 How to Verify

Check if Vulnerable:

Test authenticated access to FileManager with path traversal payloads (e.g., '../../' sequences) to see if you can access files outside intended upload directory

Check Version:

Check Ovidentia CMS version in administration panel or configuration files

Verify Fix Applied:

Retest with same path traversal attempts after implementing controls - successful attempts should be blocked

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed path traversal attempts in FileManager logs
  • Unusual file access patterns from authenticated users
  • Requests containing '../' sequences to FileManager endpoints

Network Indicators:

  • HTTP requests with path traversal patterns to FileManager URLs
  • Unusual file download patterns from upload directories

SIEM Query:

source="web_logs" AND (uri="*FileManager*" AND (uri="*../*" OR uri="*..\\*"))

🔗 References

📤 Share & Export