CVE-2022-29637

7.8 HIGH

📋 TL;DR

CVE-2022-29637 is an arbitrary file upload vulnerability in Mindoc documentation software that allows attackers to upload malicious Zip files containing executable code. When exploited, this can lead to remote code execution on the server. All users running vulnerable versions of Mindoc are affected.

💻 Affected Systems

Products:
  • Mindoc
Versions: v2.1-beta.5 and earlier versions
Operating Systems: All platforms running Mindoc
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise allowing attackers to execute arbitrary commands, steal data, install backdoors, or pivot to other systems.

🟠

Likely Case

Remote code execution leading to data theft, website defacement, or cryptocurrency mining malware installation.

🟢

If Mitigated

Limited impact if proper file upload restrictions and web application firewalls are in place.

🌐 Internet-Facing: HIGH - Internet-facing Mindoc instances are directly exploitable without authentication.
🏢 Internal Only: MEDIUM - Internal instances still vulnerable but require network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting a malicious Zip file with executable payload.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.1-beta.6 and later

Vendor Advisory: https://github.com/mindoc-org/mindoc/issues/788

Restart Required: Yes

Instructions:

1. Backup your Mindoc data and configuration. 2. Download the latest version from GitHub. 3. Replace the vulnerable files with patched version. 4. Restart the Mindoc service.

🔧 Temporary Workarounds

Restrict file upload extensions

all

Configure Mindoc to only allow specific safe file extensions for uploads

Edit Mindoc configuration to restrict uploads to .md, .txt, .pdf only

Implement WAF rules

all

Add web application firewall rules to block malicious file uploads

Add WAF rule: block requests with Content-Type containing 'zip' or 'application/zip' to upload endpoints

🧯 If You Can't Patch

  • Disable file upload functionality entirely in Mindoc configuration
  • Implement network segmentation to isolate Mindoc instances from critical systems

🔍 How to Verify

Check if Vulnerable:

Check Mindoc version in admin panel or by examining version files. If version is v2.1-beta.5 or earlier, you are vulnerable.

Check Version:

Check Mindoc admin dashboard or examine version.txt in installation directory

Verify Fix Applied:

Verify version is v2.1-beta.6 or later. Test file upload functionality with safe files only.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with .zip extensions
  • Large number of failed upload attempts
  • Suspicious POST requests to upload endpoints

Network Indicators:

  • Unusual outbound connections from Mindoc server
  • Traffic to known malicious IPs

SIEM Query:

source="mindoc.log" AND ("upload" AND ".zip") OR ("POST /upload")

🔗 References

📤 Share & Export