CVE-2022-28058

8.1 HIGH

📋 TL;DR

Verydows v2.0 contains an arbitrary file deletion vulnerability in the backend file controller that allows attackers to delete files on the server. This affects all installations of Verydows v2.0 with the vulnerable component accessible. Attackers can potentially delete critical system files or application data.

💻 Affected Systems

Products:
  • Verydows
Versions: v2.0
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the backend file controller endpoint, which may be protected by authentication in some configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical operating system files, leading to service disruption, data loss, or system instability requiring full restoration.

🟠

Likely Case

Application data deletion causing service disruption, loss of user data, or defacement through removal of web content files.

🟢

If Mitigated

Limited impact to non-critical files if proper file permissions and access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires backend access, but the vulnerability is straightforward to exploit once authenticated or if authentication is bypassed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Restrict access to backend file controller

all

Implement strict access controls to prevent unauthorized access to the vulnerable endpoint

# Add authentication/authorization checks to \backend\file_controller.php
# Implement IP whitelisting for backend access

Implement file operation validation

all

Add input validation and path traversal checks to file deletion operations

# Add path sanitization: realpath() and basename() functions
# Implement allowed file extension whitelist

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests to the vulnerable endpoint
  • Restrict file system permissions to limit the impact of successful exploitation

🔍 How to Verify

Check if Vulnerable:

Check if \backend\file_controller.php exists and contains file deletion functionality without proper path validation

Check Version:

Check Verydows version in configuration files or admin panel

Verify Fix Applied:

Test file deletion attempts with path traversal payloads to ensure they are blocked

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed file deletion attempts
  • Requests to \backend\file_controller.php with suspicious parameters
  • File deletion operations from unexpected sources

Network Indicators:

  • HTTP POST requests to backend file controller with file path parameters
  • Unusual patterns of file system access

SIEM Query:

source="web_logs" AND uri="/backend/file_controller.php" AND (method="POST" OR method="DELETE") AND (param="file" OR param="path")

🔗 References

📤 Share & Export