CVE-2022-45968

8.8 HIGH

📋 TL;DR

CVE-2022-45968 allows authenticated users with file upload permission to upload arbitrary files to any folder in Alist v3.4.0, including password-protected directories. This affects all deployments running the vulnerable version where user accounts have upload privileges. The vulnerability bypasses intended access controls and folder restrictions.

💻 Affected Systems

Products:
  • Alist
Versions: v3.4.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations where user accounts have file upload permissions. The vulnerability exists regardless of folder password protection settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could upload malicious files (webshells, malware) to protected directories, potentially gaining remote code execution, data exfiltration, or complete system compromise.

🟠

Likely Case

Unauthorized file upload leading to data integrity issues, storage abuse, or serving malicious content from the application.

🟢

If Mitigated

With proper network segmentation and file validation, impact limited to unauthorized file storage without execution capabilities.

🌐 Internet-Facing: HIGH - Internet-facing instances allow remote attackers with compromised credentials or legitimate user accounts to exploit this vulnerability.
🏢 Internal Only: MEDIUM - Internal instances still vulnerable to insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user with upload permission. The vulnerability is simple to exploit via standard HTTP file upload requests.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.5.0 and later

Vendor Advisory: https://github.com/alist-org/alist/issues/2444

Restart Required: Yes

Instructions:

1. Backup your Alist configuration and data. 2. Stop the Alist service. 3. Update to v3.5.0 or later using your deployment method (Docker, binary, source). 4. Restart the Alist service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable file upload permissions

all

Temporarily remove file upload permissions from all user accounts until patching can be completed.

Edit Alist configuration to remove upload permissions from user roles

Implement WAF rules

all

Add web application firewall rules to block suspicious file upload patterns.

WAF specific - configure rules to inspect file upload requests and block unauthorized folder access

🧯 If You Can't Patch

  • Implement strict file type validation and scanning for all uploaded files
  • Isolate Alist instance in a restricted network segment with no internet access

🔍 How to Verify

Check if Vulnerable:

Check if running Alist v3.4.0. Attempt to upload a file to a password-protected folder using a user account with only upload permissions.

Check Version:

Check Alist web interface dashboard or run: ./alist version (if using binary)

Verify Fix Applied:

After updating to v3.5.0+, verify that users with only upload permissions cannot upload files to password-protected folders.

📡 Detection & Monitoring

Log Indicators:

  • File upload requests to protected folders from users with only upload permissions
  • Successful uploads to directories with access control failures

Network Indicators:

  • HTTP POST requests to upload endpoints with folder paths that should be restricted
  • Unusual file types being uploaded to protected directories

SIEM Query:

source="alist.log" AND (event="file_upload" AND folder="protected_*" AND user_permissions="upload_only")

🔗 References

📤 Share & Export