CVE-2022-27249

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated remote attackers to upload malicious ASPX files to IdeaRE RefTree web servers, leading to remote code execution. Attackers can gain full control of affected systems by uploading and executing arbitrary code. Organizations using vulnerable versions of IdeaRE RefTree before 2021.09.17 are affected.

💻 Affected Systems

Products:
  • IdeaRE RefTree
Versions: All versions before 2021.09.17
Operating Systems: Windows (ASPX files indicate Windows/IIS deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the UploadDwg functionality. ASPX files indicate IIS web server deployment.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, steal data, deploy ransomware, or pivot to other systems in the network.

🟠

Likely Case

Attackers upload web shells to gain persistent access, exfiltrate sensitive data, and use the compromised server for further attacks.

🟢

If Mitigated

With proper file upload restrictions and web application firewalls, the attack would be blocked at the upload stage.

🌐 Internet-Facing: HIGH - Web applications with file upload functionality exposed to the internet are prime targets for exploitation.
🏢 Internal Only: MEDIUM - Internal authenticated users could exploit this, but requires valid credentials and internal network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit code is publicly available on Packet Storm. Attack requires authenticated access but is straightforward to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2021.09.17 and later

Vendor Advisory: https://www.idearespa.eu

Restart Required: Yes

Instructions:

1. Download and install IdeaRE RefTree version 2021.09.17 or later from the vendor website. 2. Apply the update to all affected systems. 3. Restart the application and web services. 4. Verify the fix by testing file upload functionality.

🔧 Temporary Workarounds

Restrict ASPX file uploads

windows

Configure web application firewall or server rules to block ASPX file uploads

IIS: Add request filtering rule to deny *.aspx extensions
Web.config: <security><requestFiltering><fileExtensions><add fileExtension=".aspx" allowed="false" /></fileExtensions></requestFiltering></security>

Disable UploadDwg functionality

all

Temporarily disable the vulnerable upload feature until patching

Remove or rename UploadDwg.aspx file
Disable upload module in application configuration

🧯 If You Can't Patch

  • Implement strict file upload validation that only allows specific whitelisted file types (DWG files only)
  • Deploy web application firewall with rules to detect and block ASPX file upload attempts

🔍 How to Verify

Check if Vulnerable:

Check RefTree version in application interface or configuration files. If version is earlier than 2021.09.17, system is vulnerable.

Check Version:

Check application interface or configuration files for version information

Verify Fix Applied:

Attempt to upload an ASPX file through the UploadDwg functionality. Successful upload should be blocked. Verify version shows 2021.09.17 or later.

📡 Detection & Monitoring

Log Indicators:

  • ASPX file upload attempts in web server logs
  • Unusual file uploads to UploadDwg endpoint
  • POST requests with .aspx extensions

Network Indicators:

  • HTTP POST requests to UploadDwg with ASPX content
  • Unusual outbound connections from web server

SIEM Query:

source="web_server" AND (uri="*UploadDwg*" OR file_extension=".aspx") AND http_method="POST"

🔗 References

📤 Share & Export