CVE-2022-47762

7.5 HIGH

📋 TL;DR

CVE-2022-47762 is a path traversal vulnerability in gin-vue-admin's download module that allows attackers to read arbitrary files from the server filesystem. This affects all gin-vue-admin deployments running versions below 2.5.5. Attackers can exploit this to access sensitive configuration files, credentials, or other protected data.

💻 Affected Systems

Products:
  • gin-vue-admin
Versions: All versions < 2.5.5
Operating Systems: All platforms running gin-vue-admin
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the download module functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive files like SSH keys, database credentials, or configuration files containing secrets, potentially leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive files containing application secrets, user data, or system information that could be used for further attacks.

🟢

If Mitigated

Limited impact with proper file permissions, network segmentation, and monitoring in place, potentially only exposing non-sensitive files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is simple to exploit with basic HTTP requests using directory traversal sequences like '../' in download parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.5.5

Vendor Advisory: https://github.com/flipped-aurora/gin-vue-admin/issues/1309

Restart Required: Yes

Instructions:

1. Update gin-vue-admin to version 2.5.5 or later. 2. Pull the latest code from the repository. 3. Rebuild and redeploy the application. 4. Restart the application server.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement input validation to reject download requests containing path traversal sequences

Implement middleware to sanitize download parameters, rejecting any containing '../', '..\\', or similar traversal patterns

Web Application Firewall Rule

all

Block requests with path traversal patterns in download endpoints

Add WAF rule to block requests to download endpoints containing '../', '..\\', '%2e%2e%2f', or encoded traversal sequences

🧯 If You Can't Patch

  • Disable the download module entirely if not required for business operations
  • Implement strict network access controls to limit access to the vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check if application version is below 2.5.5 by examining package.json or application metadata, or test by attempting to download a file with '../' in the path parameter

Check Version:

Check package.json for version or use application's built-in version endpoint if available

Verify Fix Applied:

Verify version is 2.5.5 or higher and test that path traversal attempts (e.g., requesting '../../etc/passwd') are properly rejected

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to download endpoints containing '../', '..\\', or encoded traversal sequences
  • Unusual file access patterns from web application user

Network Indicators:

  • HTTP requests with suspicious path parameters in download URLs
  • Multiple failed attempts with different traversal patterns

SIEM Query:

web.url:*download* AND (web.url:*..%2f* OR web.url:*..%5c* OR web.url:*../* OR web.url:*..\\*)

🔗 References

📤 Share & Export