CVE-2022-45171

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated remote users to upload dangerous file types without restrictions in LIVEBOX Collaboration vDesk's vShare web section. Attackers could upload malicious files like webshells or malware to compromise the system. All users of affected vDesk versions are vulnerable.

💻 Affected Systems

Products:
  • LIVEBOX Collaboration vDesk
Versions: through v018
Operating Systems: Not specified, likely multiple
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the vShare web section. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, or use as a pivot point for lateral movement within the network.

🟠

Likely Case

Unauthorized file upload leading to webshell installation, allowing remote code execution and persistent access to the system.

🟢

If Mitigated

Limited impact with proper file upload validation, but still potential for denial of service through storage exhaustion.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward once authenticated. File upload vulnerabilities are commonly weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.gruppotim.it/it/footer/red-team.html

Restart Required: No

Instructions:

Check vendor advisory for updates. If patch available, apply following vendor instructions. Monitor vendor communications for security updates.

🔧 Temporary Workarounds

Restrict File Upload Types

all

Implement server-side validation to only allow specific safe file types (e.g., .txt, .pdf, .jpg) and block executable extensions.

Configuration depends on web server and application setup. Modify upload handling code to validate file extensions and MIME types.

Implement File Upload Quarantine

all

Upload files to a quarantined directory with no execution permissions, then scan with antivirus before moving to accessible location.

Configure web server to upload to isolated directory with no execute permissions. Implement scanning script before file release.

🧯 If You Can't Patch

  • Disable vShare functionality entirely if not required for business operations.
  • Implement network segmentation to isolate vDesk systems from critical assets and monitor for suspicious upload activity.

🔍 How to Verify

Check if Vulnerable:

Test authenticated file upload in vShare section with various file types (e.g., .php, .jsp, .exe). If upload succeeds without validation, system is vulnerable.

Check Version:

Check vDesk administration interface or documentation for version information. Command varies by deployment.

Verify Fix Applied:

After applying controls, attempt to upload dangerous file types. Upload should be blocked or files should be rendered non-executable.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to vShare directory, especially with executable extensions
  • Multiple failed upload attempts followed by successful upload of suspicious file type

Network Indicators:

  • HTTP POST requests to vShare upload endpoints with unusual file content types
  • Subsequent connections to uploaded files suggesting execution

SIEM Query:

source="web_server_logs" AND (uri="/vshare/upload" OR uri CONTAINS "vshare") AND (status=200 OR status=201) AND (user_agent CONTAINS "curl" OR user_agent CONTAINS "wget" OR file_extension IN ("php", "jsp", "exe", "sh"))

🔗 References

📤 Share & Export