CVE-2022-27429

9.8 CRITICAL

📋 TL;DR

Jizhicms v1.9.5 contains a Server-Side Request Forgery (SSRF) vulnerability in the /admin.php/Plugins/update.html endpoint. This allows attackers to make the server send unauthorized requests to internal systems. All users running Jizhicms v1.9.5 with the vulnerable endpoint accessible are affected.

💻 Affected Systems

Products:
  • Jizhicms
Versions: v1.9.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the admin.php/Plugins/update.html endpoint. Default installations are vulnerable if this endpoint is accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could pivot to internal networks, access cloud metadata services, perform port scanning, or interact with internal APIs to steal sensitive data or execute further attacks.

🟠

Likely Case

Attackers scan internal networks, access internal web services, or interact with cloud metadata to obtain credentials and escalate privileges.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the web server itself with minimal data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the admin endpoint. SSRF vulnerabilities are commonly weaponized due to their versatility in internal network attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.9.6 or later

Vendor Advisory: https://github.com/Cherry-toto/jizhicms/issues/67

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download the latest version from the official repository. 3. Replace the vulnerable files with patched versions. 4. Verify the update by checking the version.

🔧 Temporary Workarounds

Restrict Access to Admin Endpoint

all

Block external access to /admin.php/Plugins/update.html using web server configuration or firewall rules.

# Apache: <Location /admin.php/Plugins/update.html> Require ip 192.168.1.0/24 </Location>
# Nginx: location /admin.php/Plugins/update.html { deny all; }

Network Segmentation

all

Isolate the Jizhicms server from internal networks to limit SSRF impact.

🧯 If You Can't Patch

  • Implement strict outbound firewall rules to block the server from accessing internal services except necessary ones.
  • Use a web application firewall (WAF) with SSRF protection rules to block malicious requests.

🔍 How to Verify

Check if Vulnerable:

Check if accessing /admin.php/Plugins/update.html with a malicious URL parameter causes the server to make external requests. Use controlled testing only.

Check Version:

Check the CMS version in the admin panel or look for version files in the installation directory.

Verify Fix Applied:

After patching, test the same endpoint with SSRF payloads to confirm requests are blocked or sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound requests from the web server to internal IPs or domains
  • Multiple requests to /admin.php/Plugins/update.html with URL parameters

Network Indicators:

  • Web server making unexpected connections to internal services or cloud metadata endpoints

SIEM Query:

source="web_server_logs" AND uri="/admin.php/Plugins/update.html" AND (query CONTAINS "http://" OR query CONTAINS "https://")

🔗 References

📤 Share & Export