CVE-2022-28021

9.8 CRITICAL

📋 TL;DR

CVE-2022-28021 is a remote code execution vulnerability in Purchase Order Management System v1.0, allowing attackers to execute arbitrary code via the /purchase_order/admin/?page=user endpoint. This affects organizations using this specific software version, potentially leading to full system compromise.

💻 Affected Systems

Products:
  • Purchase Order Management System
Versions: v1.0
Operating Systems: Any OS running the software (e.g., Linux, Windows)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability is present in the default installation of v1.0; no specific configurations are required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover, data theft, ransomware deployment, or lateral movement across the network.

🟠

Likely Case

Unauthorized access to sensitive purchase order data, system disruption, or malware installation.

🟢

If Mitigated

Limited impact if isolated in a segmented network with strict access controls, but still poses a risk if exploited.

🌐 Internet-Facing: HIGH, as the vulnerability is remotely exploitable via a web interface, making internet-exposed instances prime targets.
🏢 Internal Only: MEDIUM, as internal attackers or compromised systems could exploit it, but network segmentation may reduce exposure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available in GitHub repositories, indicating low complexity for attackers to leverage.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No known vendor advisory

Restart Required: No

Instructions:

No official patch is available; consider upgrading to a newer version if released or applying workarounds.

🔧 Temporary Workarounds

Restrict Access to Admin Interface

linux

Block or restrict network access to the /purchase_order/admin/ endpoint using firewall rules or web server configurations.

iptables -A INPUT -p tcp --dport 80 -m string --string '/purchase_order/admin/' --algo bm -j DROP

Disable Vulnerable Endpoint

all

Modify the web application to disable or remove the /purchase_order/admin/?page=user functionality.

🧯 If You Can't Patch

  • Isolate the system in a segmented network to limit potential lateral movement.
  • Implement strict access controls and monitor for unusual activity on the affected endpoint.

🔍 How to Verify

Check if Vulnerable:

Check if the software version is v1.0 and test access to /purchase_order/admin/?page=user for unexpected behavior or code execution.

Check Version:

Check the software's documentation or configuration files for version information; no standard command is provided.

Verify Fix Applied:

Verify that the endpoint is no longer accessible or that workarounds are effectively blocking exploitation attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /purchase_order/admin/?page=user, especially with suspicious parameters or payloads.

Network Indicators:

  • Traffic spikes to the admin endpoint, unexpected outbound connections from the system.

SIEM Query:

Example: source_ip='*' AND url_path='/purchase_order/admin/?page=user' AND status_code=200

🔗 References

📤 Share & Export