CVE-2022-24239

9.8 CRITICAL

📋 TL;DR

ACEweb Online Portal 3.5.065 contains an unrestricted file upload vulnerability in the attachments.awp component. This allows attackers to upload malicious files without proper validation, potentially leading to remote code execution. All systems running the vulnerable version are affected.

💻 Affected Systems

Products:
  • ACEweb Online Portal
Versions: 3.5.065
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is in the attachments.awp component which appears to be enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, data theft, and lateral movement within the network.

🟠

Likely Case

Webshell deployment leading to unauthorized access, data exfiltration, and potential ransomware deployment.

🟢

If Mitigated

File upload attempts blocked or quarantined with no successful exploitation.

🌐 Internet-Facing: HIGH - Internet-facing portals are directly accessible to attackers without network perimeter controls.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unrestricted file upload vulnerabilities are typically easy to exploit with readily available tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.066 or later

Vendor Advisory: https://www.aceware.com/forum/viewtopic.php?f=7&t=481

Restart Required: Yes

Instructions:

1. Download the latest version from the vendor website. 2. Backup current installation. 3. Install the update following vendor instructions. 4. Restart the ACEweb service.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block file uploads with dangerous extensions or suspicious patterns.

File Upload Restriction

all

Configure the web server to restrict file uploads to specific directories with execute permissions disabled.

🧯 If You Can't Patch

  • Isolate the ACEweb server in a DMZ with strict network segmentation and access controls.
  • Implement file integrity monitoring on the upload directory and alert on any unauthorized file changes.

🔍 How to Verify

Check if Vulnerable:

Check the ACEweb portal version in the admin interface or configuration files. If version is 3.5.065, the system is vulnerable.

Check Version:

Check the admin panel or configuration files for version information.

Verify Fix Applied:

After patching, verify the version shows 3.5.066 or later. Test file upload functionality with various file types to ensure proper validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to attachments.awp endpoint
  • Files with executable extensions in upload directories
  • Multiple failed upload attempts

Network Indicators:

  • HTTP POST requests to attachments.awp with unusual file types
  • Traffic patterns indicating file upload exploitation

SIEM Query:

source="aceweb" AND (uri="*attachments.awp*" OR method="POST") AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp" OR file_extension="exe")

🔗 References

📤 Share & Export