CVE-2022-24609

9.8 CRITICAL

📋 TL;DR

Luocms v2.0 has an incorrect access control vulnerability that allows attackers to write arbitrary shell files via /admin/templates/template_manage.php. This enables remote code execution on affected systems. Anyone running Luocms v2.0 is vulnerable.

💻 Affected Systems

Products:
  • Luocms
Versions: v2.0
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Any Luocms v2.0 installation with the vulnerable file accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the web server, data exfiltration, ransomware deployment, and lateral movement to other systems.

🟠

Likely Case

Webshell deployment leading to data theft, defacement, cryptocurrency mining, or use as a botnet node.

🟢

If Mitigated

Attack blocked at perimeter with no internal access achieved.

🌐 Internet-Facing: HIGH - Directly exploitable via web interface without authentication.
🏢 Internal Only: HIGH - If accessible internally, same exploitation path exists.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to vulnerable endpoint with shell payload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative CMS or implementing workarounds.

🔧 Temporary Workarounds

Restrict access to vulnerable file

all

Block access to /admin/templates/template_manage.php via web server configuration

# Apache: add to .htaccess
<Files "template_manage.php">
    Order Deny,Allow
    Deny from all
</Files>
# Nginx: add to server block
location ~ /admin/templates/template_manage\.php$ {
    deny all;
    return 403;
}

Remove vulnerable file

linux

Delete or rename the vulnerable PHP file

rm /path/to/luocms/admin/templates/template_manage.php
mv /path/to/luocms/admin/templates/template_manage.php /path/to/luocms/admin/templates/template_manage.php.bak

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Luocms from critical systems
  • Deploy web application firewall with rules blocking requests to template_manage.php

🔍 How to Verify

Check if Vulnerable:

Check if /admin/templates/template_manage.php exists and is accessible via HTTP GET request. If accessible without authentication, system is vulnerable.

Check Version:

Check Luocms version in configuration files or admin panel. Look for version 2.0 indicators.

Verify Fix Applied:

Attempt to access /admin/templates/template_manage.php - should return 403 or 404 error. Verify file permissions or web server blocks are in place.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /admin/templates/template_manage.php with POST data containing shell code
  • Unusual file creation in web directories with .php extension
  • Suspicious process execution from web user context

Network Indicators:

  • Outbound connections from web server to unknown IPs
  • Unusual traffic patterns from Luocms server

SIEM Query:

source="web_logs" AND (uri="/admin/templates/template_manage.php" OR uri CONTAINS "template_manage") AND method="POST"

🔗 References

📤 Share & Export