CVE-2022-48161

7.5 HIGH

📋 TL;DR

Easy Images v2.0 contains an arbitrary file download vulnerability in the /application/down.php component that allows attackers to download any file from the server via crafted GET requests. This affects all installations of Easy Images v2.0 that expose the vulnerable component. Attackers can potentially access sensitive system files and configuration data.

💻 Affected Systems

Products:
  • Easy Images
Versions: v2.0
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of Easy Images v2.0 with the /application/down.php component accessible are vulnerable. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through downloading sensitive files like configuration files, password databases, or SSH keys, leading to lateral movement and data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive application files, configuration data, and potentially user-uploaded content, resulting in data leakage and privacy violations.

🟢

If Mitigated

Limited impact with proper file system permissions and network segmentation, potentially restricting access to non-critical files only.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via simple HTTP GET requests and requires no authentication, making internet-facing instances extremely vulnerable.
🏢 Internal Only: MEDIUM - Internal instances are still vulnerable but require network access; risk depends on internal network segmentation and access controls.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP GET requests with crafted parameters. Public proof-of-concept code is available in GitHub repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds and mitigations.

🔧 Temporary Workarounds

Block vulnerable endpoint

all

Use web server configuration to block access to /application/down.php

# Apache: Add to .htaccess or virtual host config
<Location "/application/down.php">
    Order deny,allow
    Deny from all
</Location>
# Nginx: Add to server block
location = /application/down.php {
    deny all;
    return 403;
}

Implement input validation

all

Add parameter validation to down.php to restrict file paths

# Example PHP validation
$allowed_paths = ['uploads/', 'images/'];
$requested_file = $_GET['file'];

foreach ($allowed_paths as $path) {
    if (strpos($requested_file, $path) === 0) {
        // Allow download
        break;
    }
    // Deny all other paths
    http_response_code(403);
    exit;

🧯 If You Can't Patch

  • Implement strict file system permissions to limit what files the web server can read
  • Deploy a web application firewall (WAF) with rules to detect and block path traversal attempts

🔍 How to Verify

Check if Vulnerable:

Attempt to access /application/down.php?file=../../../../etc/passwd (or similar path traversal) and check if it returns sensitive system files.

Check Version:

Check application version in configuration files or admin interface. For Easy Images, check config files or about page.

Verify Fix Applied:

After implementing workarounds, test that the same exploit attempts return 403 Forbidden or proper error messages instead of file contents.

📡 Detection & Monitoring

Log Indicators:

  • HTTP GET requests to /application/down.php with ../ patterns in parameters
  • Multiple failed attempts with different file paths
  • Unusual file access patterns from single IP addresses

Network Indicators:

  • HTTP requests with path traversal sequences (../) in URL parameters
  • Rapid sequential requests to download.php with different file parameters

SIEM Query:

source="web_access_logs" AND url="/application/down.php" AND (url_parameters CONTAINS "../" OR url_parameters CONTAINS "..\\")

🔗 References

📤 Share & Export