CVE-2022-24609
📋 TL;DR
Luocms v2.0 has an incorrect access control vulnerability that allows attackers to write arbitrary shell files via /admin/templates/template_manage.php. This enables remote code execution on affected systems. Anyone running Luocms v2.0 is vulnerable.
💻 Affected Systems
- Luocms
📦 What is this software?
Luocms by Luocms Project
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining complete control over the web server, data exfiltration, ransomware deployment, and lateral movement to other systems.
Likely Case
Webshell deployment leading to data theft, defacement, cryptocurrency mining, or use as a botnet node.
If Mitigated
Attack blocked at perimeter with no internal access achieved.
🎯 Exploit Status
Simple HTTP request to vulnerable endpoint with shell payload.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None found
Restart Required: No
Instructions:
No official patch available. Consider migrating to alternative CMS or implementing workarounds.
🔧 Temporary Workarounds
Restrict access to vulnerable file
allBlock access to /admin/templates/template_manage.php via web server configuration
# Apache: add to .htaccess
<Files "template_manage.php">
Order Deny,Allow
Deny from all
</Files>
# Nginx: add to server block
location ~ /admin/templates/template_manage\.php$ {
deny all;
return 403;
}
Remove vulnerable file
linuxDelete or rename the vulnerable PHP file
rm /path/to/luocms/admin/templates/template_manage.php
mv /path/to/luocms/admin/templates/template_manage.php /path/to/luocms/admin/templates/template_manage.php.bak
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Luocms from critical systems
- Deploy web application firewall with rules blocking requests to template_manage.php
🔍 How to Verify
Check if Vulnerable:
Check if /admin/templates/template_manage.php exists and is accessible via HTTP GET request. If accessible without authentication, system is vulnerable.
Check Version:
Check Luocms version in configuration files or admin panel. Look for version 2.0 indicators.
Verify Fix Applied:
Attempt to access /admin/templates/template_manage.php - should return 403 or 404 error. Verify file permissions or web server blocks are in place.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /admin/templates/template_manage.php with POST data containing shell code
- Unusual file creation in web directories with .php extension
- Suspicious process execution from web user context
Network Indicators:
- Outbound connections from web server to unknown IPs
- Unusual traffic patterns from Luocms server
SIEM Query:
source="web_logs" AND (uri="/admin/templates/template_manage.php" OR uri CONTAINS "template_manage") AND method="POST"