CVE-2023-27700

8.1 HIGH

📋 TL;DR

MuYuCMS v2.2 contains an arbitrary file deletion vulnerability in the /accessory/picdel.html component that allows attackers to delete any file on the server. This affects all MuYuCMS v2.2 installations with the vulnerable component accessible. Attackers can potentially delete critical system files or application data.

💻 Affected Systems

Products:
  • MuYuCMS
Versions: v2.2
Operating Systems: All operating systems running MuYuCMS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of MuYuCMS v2.2 are vulnerable. The vulnerability exists in the core CMS component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical operating system files, leading to system instability, data loss, or service disruption.

🟠

Likely Case

Application data deletion, website defacement, or denial of service by deleting key application files.

🟢

If Mitigated

Limited impact if proper file permissions and access controls restrict deletion to non-critical directories.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is typically accessible via web interface, making internet-facing systems particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but may have additional network segmentation and access controls.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to access the vulnerable endpoint. The vulnerability is path traversal allowing arbitrary file deletion.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.3 or later

Vendor Advisory: https://github.com/MuYuCMS/MuYuCMS/issues/8

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download and install MuYuCMS v2.3 or later from the official repository. 3. Replace the vulnerable /accessory/picdel.html component. 4. Verify the fix by testing file deletion functionality.

🔧 Temporary Workarounds

Disable vulnerable endpoint

linux

Remove or restrict access to the /accessory/picdel.html file

mv /path/to/MuYuCMS/accessory/picdel.html /path/to/MuYuCMS/accessory/picdel.html.disabled
chmod 000 /path/to/MuYuCMS/accessory/picdel.html

Implement input validation

all

Add path traversal validation to the file deletion function

🧯 If You Can't Patch

  • Implement strict file permissions to restrict deletion to specific directories only
  • Deploy web application firewall (WAF) rules to block path traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check if /accessory/picdel.html exists and accepts file path parameters without proper validation. Test with controlled file deletion attempts.

Check Version:

Check MuYuCMS version in configuration files or admin panel. Typically in /config/version.php or similar.

Verify Fix Applied:

Verify that arbitrary file deletion is no longer possible and only allowed files can be deleted. Check that path traversal attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed file deletion attempts
  • Access to /accessory/picdel.html with unusual file paths
  • Path traversal patterns in request logs

Network Indicators:

  • HTTP requests to /accessory/picdel.html with ../ patterns in parameters
  • Unusual file deletion patterns from web interface

SIEM Query:

source="web_logs" AND uri="/accessory/picdel.html" AND (param="../" OR param="..\\")

🔗 References

📤 Share & Export