CVE-2022-28058
📋 TL;DR
Verydows v2.0 contains an arbitrary file deletion vulnerability in the backend file controller that allows attackers to delete files on the server. This affects all installations of Verydows v2.0 with the vulnerable component accessible. Attackers can potentially delete critical system files or application data.
💻 Affected Systems
- Verydows
📦 What is this software?
Verydows by Verydows
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through deletion of critical operating system files, leading to service disruption, data loss, or system instability requiring full restoration.
Likely Case
Application data deletion causing service disruption, loss of user data, or defacement through removal of web content files.
If Mitigated
Limited impact to non-critical files if proper file permissions and access controls are implemented.
🎯 Exploit Status
Exploitation requires backend access, but the vulnerability is straightforward to exploit once authenticated or if authentication is bypassed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: No
Instructions:
No official patch available. Consider upgrading to a newer version if available or implementing workarounds.
🔧 Temporary Workarounds
Restrict access to backend file controller
allImplement strict access controls to prevent unauthorized access to the vulnerable endpoint
# Add authentication/authorization checks to \backend\file_controller.php
# Implement IP whitelisting for backend access
Implement file operation validation
allAdd input validation and path traversal checks to file deletion operations
# Add path sanitization: realpath() and basename() functions
# Implement allowed file extension whitelist
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block requests to the vulnerable endpoint
- Restrict file system permissions to limit the impact of successful exploitation
🔍 How to Verify
Check if Vulnerable:
Check if \backend\file_controller.php exists and contains file deletion functionality without proper path validation
Check Version:
Check Verydows version in configuration files or admin panel
Verify Fix Applied:
Test file deletion attempts with path traversal payloads to ensure they are blocked
📡 Detection & Monitoring
Log Indicators:
- Multiple failed file deletion attempts
- Requests to \backend\file_controller.php with suspicious parameters
- File deletion operations from unexpected sources
Network Indicators:
- HTTP POST requests to backend file controller with file path parameters
- Unusual patterns of file system access
SIEM Query:
source="web_logs" AND uri="/backend/file_controller.php" AND (method="POST" OR method="DELETE") AND (param="file" OR param="path")