CVE-2022-24992

7.5 HIGH

📋 TL;DR

This vulnerability in QR Code Generator v5.2.7 allows attackers to perform directory traversal through the process.php component. Attackers can read arbitrary files on the server, potentially exposing sensitive configuration files, credentials, or other data. This affects any system running the vulnerable version of QRCDR QR Code Generator.

💻 Affected Systems

Products:
  • QRCDR Responsive QR Code Generator
Versions: v5.2.7 and possibly earlier versions
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of the software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive files like /etc/passwd, database credentials, or SSH keys, leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized reading of configuration files, source code, or other sensitive server files that could enable further attacks.

🟢

If Mitigated

Limited to reading non-sensitive files if proper file permissions and web server configurations are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit with publicly available proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider removing or replacing the software.

🔧 Temporary Workarounds

Input Validation in process.php

all

Add input validation to sanitize file path parameters in process.php

Edit process.php to validate and sanitize all user input before file operations

Web Server Configuration

all

Configure web server to restrict access to sensitive directories

Add appropriate .htaccess rules or nginx location blocks to restrict file access

🧯 If You Can't Patch

  • Remove or disable the QR Code Generator application
  • Implement network segmentation and restrict access to the affected system

🔍 How to Verify

Check if Vulnerable:

Check if process.php exists and accepts file path parameters without proper validation. Test with a path traversal payload like ../../../etc/passwd

Check Version:

Check the software version in the application files or admin panel

Verify Fix Applied:

Verify that path traversal attempts are blocked and return appropriate error responses

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests to process.php with ../ patterns
  • Access to sensitive file paths in web logs
  • Unusual file read operations

Network Indicators:

  • HTTP requests containing directory traversal sequences to process.php

SIEM Query:

web.url:*process.php* AND (web.url:*../* OR web.url:*..\*)

🔗 References

📤 Share & Export