CVE-2022-29651

7.2 HIGH

📋 TL;DR

This vulnerability allows attackers to upload arbitrary PHP files through the Select Image function in Online Food Ordering System v1.0, leading to remote code execution. Attackers can gain full control of affected systems. Anyone running this specific version of the software is affected.

💻 Affected Systems

Products:
  • Online Food Ordering System
Versions: v1.0
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations with no additional security configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, steal data, install backdoors, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Web server compromise leading to data theft, defacement, or use as part of a botnet for further attacks.

🟢

If Mitigated

Limited impact with proper file upload restrictions and web application firewalls blocking malicious uploads.

🌐 Internet-Facing: HIGH - This is a web application vulnerability that can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code exists and requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: No official vendor advisory found

Restart Required: No

Instructions:

No official patch available. Consider migrating to alternative software or implementing workarounds.

🔧 Temporary Workarounds

File Upload Restriction

all

Implement strict file upload validation to only allow specific image file types and block PHP files

Modify upload handling code to check file extensions and MIME types
Implement server-side file type verification

Web Application Firewall Rules

all

Configure WAF to block PHP file uploads and suspicious upload patterns

Add WAF rule: deny requests with .php files in upload parameters
Block requests with PHP code patterns in file content

🧯 If You Can't Patch

  • Disable the Select Image functionality completely
  • Implement network segmentation to isolate the vulnerable system from critical assets

🔍 How to Verify

Check if Vulnerable:

Attempt to upload a PHP file through the Select Image function. If successful, system is vulnerable.

Check Version:

Check software version in admin panel or configuration files

Verify Fix Applied:

Test that PHP files cannot be uploaded and previously uploaded PHP files cannot be executed.

📡 Detection & Monitoring

Log Indicators:

  • PHP file uploads in web server logs
  • Unusual file upload patterns
  • Execution of uploaded files

Network Indicators:

  • HTTP POST requests with PHP file uploads
  • Unusual outbound connections from web server

SIEM Query:

source="web_server" AND (file_extension=".php" OR method="POST" AND uri CONTAINS "upload")

🔗 References

📤 Share & Export