CVE-2022-23043

7.2 HIGH

📋 TL;DR

CVE-2022-23043 is an unrestricted file upload vulnerability in Zenario CMS that allows authenticated admin users to bypass file upload restrictions by creating a '.phar' MIME type and uploading malicious files. This enables remote code execution on the server. All Zenario CMS 9.2 installations with admin accounts are affected.

💻 Affected Systems

Products:
  • Zenario CMS
Versions: 9.2 (specifically versions before 9.2.55826)
Operating Systems: All platforms running Zenario CMS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated admin access to exploit. All default installations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing attacker to execute arbitrary commands, access sensitive data, install backdoors, and pivot to other systems.

🟠

Likely Case

Unauthorized file upload leading to web shell deployment and limited command execution within web server context.

🟢

If Mitigated

Attack fails due to proper file upload validation and admin account security controls.

🌐 Internet-Facing: HIGH - Web applications are typically internet-facing and admin panels may be exposed.
🏢 Internal Only: MEDIUM - Internal admin users could still exploit if they have malicious intent.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires admin credentials but is straightforward once authenticated. Public advisory includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.2.55826

Vendor Advisory: https://github.com/TribalSystems/Zenario/releases/tag/9.2.55826

Restart Required: No

Instructions:

1. Backup your Zenario installation. 2. Download version 9.2.55826 or later from the official repository. 3. Replace existing files with patched version. 4. Clear any cached files. 5. Verify the patch is applied.

🔧 Temporary Workarounds

Restrict admin access

all

Limit admin panel access to trusted IP addresses only using web server configuration.

# Apache example: <Location /admin> Require ip 192.168.1.0/24 </Location>
# Nginx example: allow 192.168.1.0/24; deny all;

File upload restrictions

all

Implement additional file upload validation at web server level to block .phar files.

# Apache: <FilesMatch "\.phar$"> Require all denied </FilesMatch>
# Nginx: location ~ \.phar$ { deny all; }

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Zenario server from critical systems.
  • Enable detailed logging and monitoring for file upload activities and admin panel access.

🔍 How to Verify

Check if Vulnerable:

Check Zenario version in admin panel or via database: SELECT value FROM zenario_site_config WHERE name = 'version'

Check Version:

Check admin dashboard or database query above

Verify Fix Applied:

Verify version is 9.2.55826 or higher and test file upload with .phar extension should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • Admin user creating new MIME types with .phar extension
  • File uploads with .phar extension in access logs
  • Unusual POST requests to file upload endpoints

Network Indicators:

  • HTTP POST requests with .phar file uploads
  • Admin panel access from unusual IP addresses

SIEM Query:

source="web_logs" AND (uri_path="*/admin/*" AND (method="POST" AND (file_extension=".phar" OR params LIKE "%phar%")))

🔗 References

📤 Share & Export