CVE-2022-34971

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to upload arbitrary PHP files through the Advertising Management module of Feehi CMS. Attackers can achieve remote code execution by uploading malicious PHP files. All Feehi CMS v2.1.1 installations with the Advertising Management module enabled are affected.

💻 Affected Systems

Products:
  • Feehi CMS
Versions: v2.1.1
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Advertising Management module to be enabled/accessible. The vulnerability exists in the file upload functionality of this module.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the web server, allowing data theft, malware deployment, and lateral movement within the network.

🟠

Likely Case

Webshell deployment leading to website defacement, data exfiltration, and potential pivot to internal network resources.

🟢

If Mitigated

Attack blocked at web application firewall level or file upload validation prevents malicious file execution.

🌐 Internet-Facing: HIGH - Web applications are directly accessible from the internet, making them prime targets for automated exploitation.
🏢 Internal Only: MEDIUM - Internal applications could be exploited by malicious insiders or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the Advertising Management module interface. The vulnerability is well-documented in public GitHub issues with technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.1.2 or later

Vendor Advisory: https://github.com/liufee/cms/issues/62

Restart Required: No

Instructions:

1. Backup your current installation and database. 2. Download the latest version from the official repository. 3. Replace all files except configuration files and uploads directory. 4. Verify the Advertising Management module no longer accepts PHP file uploads.

🔧 Temporary Workarounds

Disable Advertising Management Module

linux

Temporarily disable or restrict access to the vulnerable Advertising Management module

# Remove or rename the advertising module directory
mv /path/to/cms/modules/advertising /path/to/cms/modules/advertising.disabled

Web Application Firewall Rules

all

Block PHP file uploads to the advertising management endpoints

# Example ModSecurity rule: SecRule REQUEST_URI "@contains /admin/advertising" "id:1001,phase:2,deny,msg:'Block advertising module uploads'"

🧯 If You Can't Patch

  • Implement strict file upload validation: only allow specific file extensions (jpg, png, pdf) and validate file content
  • Configure web server to not execute PHP files in upload directories using .htaccess or nginx configuration

🔍 How to Verify

Check if Vulnerable:

Check if you can upload a PHP file through the Advertising Management module interface at /admin/advertising or similar path

Check Version:

Check the version.php file or admin dashboard: cat /path/to/cms/version.php | grep 'version'

Verify Fix Applied:

Attempt to upload a PHP file through the Advertising Management module - it should be rejected with proper validation

📡 Detection & Monitoring

Log Indicators:

  • PHP file uploads to advertising-related endpoints
  • Unusual file uploads with .php extension
  • Multiple failed upload attempts followed by successful PHP upload

Network Indicators:

  • POST requests to /admin/advertising/upload with PHP file content
  • Subsequent requests to uploaded PHP files in upload directories

SIEM Query:

source="web_logs" AND (uri_path="/admin/advertising/upload" AND file_extension=".php")

🔗 References

📤 Share & Export