CVE-2022-29632

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload malicious files to the Roncoo Education platform's course API endpoint, which can lead to remote code execution. Any organization running Roncoo Education v9.0.0 with the vulnerable component exposed is affected. Attackers can compromise the entire system through this file upload flaw.

💻 Affected Systems

Products:
  • Roncoo Education
Versions: v9.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the /course/api/upload/pic endpoint which appears to be part of standard functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, steal sensitive data, install backdoors, and pivot to other systems.

🟠

Likely Case

Webshell deployment leading to data exfiltration, credential theft, and lateral movement within the network.

🟢

If Mitigated

File upload attempts blocked or sanitized, preventing malicious file execution while maintaining legitimate functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub issue shows exploitation details and the vulnerability is straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/roncoo/roncoo-education/issues/16

Restart Required: No

Instructions:

No official patch available. Check GitHub repository for updates or consider upgrading to newer versions if available.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

all

Temporarily block access to the vulnerable /course/api/upload/pic endpoint using web server configuration or WAF rules.

# Apache: RewriteRule ^/course/api/upload/pic - [F]
# Nginx: location ~ ^/course/api/upload/pic { deny all; }

Implement File Upload Restrictions

all

Configure web application firewall or reverse proxy to restrict file uploads to specific file types and sizes.

# Example ModSecurity rule: SecRule REQUEST_URI "@streq /course/api/upload/pic" "id:1001,phase:1,deny"

🧯 If You Can't Patch

  • Implement strict file upload validation including file type checking, content verification, and size limits.
  • Deploy a web application firewall (WAF) with rules specifically blocking exploitation of this vulnerability.

🔍 How to Verify

Check if Vulnerable:

Check if Roncoo Education version is 9.0.0 and the /course/api/upload/pic endpoint accepts file uploads without proper validation.

Check Version:

Check application configuration files or database version tables for Roncoo Education version information.

Verify Fix Applied:

Test file upload functionality with malicious files to ensure they are rejected or properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /course/api/upload/pic endpoint
  • Large number of upload requests
  • Uploads of non-image file types

Network Indicators:

  • POST requests to /course/api/upload/pic with executable file extensions
  • Unusual outbound connections from the application server

SIEM Query:

source="web_server" AND uri="/course/api/upload/pic" AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp")

🔗 References

📤 Share & Export