CVE-2022-25773

4.3 MEDIUM

📋 TL;DR

CVE-2022-25773 is a path traversal vulnerability in Mautic's asset upload functionality that allows authenticated users to upload files to directories outside the intended temporary directory. This affects Mautic installations with user accounts that have asset upload permissions. The vulnerability could lead to unauthorized file placement on the server.

💻 Affected Systems

Products:
  • Mautic
Versions: Versions prior to 4.4.13
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with asset upload permissions. Affects all operating systems running vulnerable Mautic versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could upload malicious files to sensitive system directories, potentially leading to remote code execution, data exfiltration, or complete system compromise.

🟠

Likely Case

Authenticated users could place files in unintended locations, potentially overwriting existing files or creating backdoors for future exploitation.

🟢

If Mitigated

With proper file permission controls and input validation, impact is limited to file placement in non-critical directories.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.4.13

Vendor Advisory: https://github.com/mautic/mautic/security/advisories/GHSA-4w2w-36vm-c8hf

Restart Required: No

Instructions:

1. Backup your Mautic installation and database. 2. Update Mautic to version 4.4.13 or later. 3. Verify the update completed successfully. 4. Test asset upload functionality.

🔧 Temporary Workarounds

Restrict Asset Upload Permissions

all

Temporarily disable or restrict asset upload permissions for non-admin users

Implement Web Application Firewall Rules

all

Add WAF rules to block path traversal patterns in upload requests

🧯 If You Can't Patch

  • Implement strict file permission controls on server directories
  • Monitor and audit all file upload activities and server file changes

🔍 How to Verify

Check if Vulnerable:

Check Mautic version in admin dashboard or via composer show mautic/core

Check Version:

composer show mautic/core | grep versions

Verify Fix Applied:

Verify version is 4.4.13 or later and test asset upload with path traversal attempts

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns
  • Requests containing ../ or path traversal sequences
  • Files appearing in unexpected directories

Network Indicators:

  • HTTP POST requests to upload endpoints with suspicious path parameters

SIEM Query:

source="web_server" AND (uri_path="*/assets/upload" OR uri_path="*/file/upload") AND (request_body CONTAINS "../" OR request_body CONTAINS "..\")

🔗 References

📤 Share & Export