CVE-2022-28120

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious files to the Open Virtual Simulation Experiment Teaching Management Platform software version 2.0. Exploitation can lead to remote code execution and complete server compromise. Organizations using this specific Chinese educational software are affected.

💻 Affected Systems

Products:
  • Beijing Runnier Network Technology Co., Ltd Open Virtual Simulation Experiment Teaching Management Platform
Versions: 2.0
Operating Systems: Unknown - likely Windows Server or Linux web servers
Default Config Vulnerable: ⚠️ Yes
Notes: Specific to Chinese educational software with limited international deployment.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with administrative privileges, data theft, lateral movement to other systems, and persistent backdoor installation.

🟠

Likely Case

Webshell deployment leading to data exfiltration, credential harvesting, and use as attack launch point.

🟢

If Mitigated

Limited impact with proper file upload restrictions, but still potential for information disclosure.

🌐 Internet-Facing: HIGH - Web application with file upload functionality directly exposed to internet.
🏢 Internal Only: MEDIUM - Still vulnerable to internal threats but attack surface reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

File upload vulnerabilities are commonly exploited with simple tools. No public exploit code found but trivial to weaponize.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.cnvd.org.cn/flaw/show/CNVD-2021-39055

Restart Required: No

Instructions:

1. Contact vendor Beijing Runnier Network Technology for patch information. 2. Monitor CNVD for updates. 3. Consider alternative software if no patch available.

🔧 Temporary Workarounds

File Upload Restriction

all

Implement strict file upload validation including file type checking, size limits, and content inspection.

Web Application Firewall Rules

all

Deploy WAF rules to block suspicious file upload patterns and executable file types.

🧯 If You Can't Patch

  • Isolate the vulnerable system in a DMZ with strict network segmentation
  • Implement application-level file upload validation and store uploaded files outside web root

🔍 How to Verify

Check if Vulnerable:

Test file upload functionality with various file types including executable extensions. Check if server executes uploaded files.

Check Version:

Check software version in admin panel or configuration files. Exact command unknown for this proprietary software.

Verify Fix Applied:

Attempt to upload malicious files and verify they are rejected or stored safely without execution capability.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with executable extensions
  • Multiple failed upload attempts
  • Webshell access patterns in web logs

Network Indicators:

  • HTTP POST requests with file uploads to unusual paths
  • Outbound connections from web server to unknown IPs

SIEM Query:

web.url:*upload* AND (web.file_extension:php OR web.file_extension:jsp OR web.file_extension:asp OR web.file_extension:exe)

🔗 References

📤 Share & Export