CVE-2023-36212

8.8 HIGH

📋 TL;DR

CVE-2023-36212 is a file upload vulnerability in Total CMS v1.7.4 that allows remote attackers to upload crafted PHP files through the edit page function, leading to arbitrary code execution. This affects all systems running Total CMS v1.7.4 with the vulnerable edit page functionality enabled. Attackers can gain complete control of affected web servers.

💻 Affected Systems

Products:
  • Total CMS
Versions: v1.7.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the edit page functionality which appears to be enabled by default. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise with attacker gaining root/admin access, data exfiltration, ransomware deployment, and use as pivot point for lateral movement.

🟠

Likely Case

Webshell upload leading to website defacement, data theft, and backdoor persistence on the server.

🟢

If Mitigated

Attack blocked at WAF/web application firewall level with file upload restrictions preventing PHP execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Multiple public exploits available requiring authentication to the edit page. Exploitation is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a newer version if available, or implement workarounds.

🔧 Temporary Workarounds

Restrict PHP File Uploads

all

Configure web server to block PHP file uploads or execution from upload directories

# For Apache: Add to .htaccess in upload directory
<Files *.php>
    Order Deny,Allow
    Deny from all
</Files>
# For Nginx: Add to server block
location ~* \.php$ {
    deny all;
    return 403;
}

Disable Edit Page Function

all

Remove or disable the vulnerable edit page functionality

# Remove or rename the edit page file
mv /path/to/edit_page.php /path/to/edit_page.php.disabled

🧯 If You Can't Patch

  • Implement strict file upload validation: only allow specific file types, validate file extensions, and scan uploaded files
  • Deploy WAF rules to block PHP file uploads and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if running Total CMS v1.7.4 and if edit page functionality is accessible

Check Version:

Check CMS configuration files or admin panel for version information

Verify Fix Applied:

Attempt to upload a PHP file through the edit page - should be blocked or fail

📡 Detection & Monitoring

Log Indicators:

  • PHP file uploads to edit page endpoint
  • Unusual file uploads with .php extension
  • Multiple failed upload attempts

Network Indicators:

  • POST requests to edit page with file uploads
  • Unusual outbound connections from web server

SIEM Query:

source="web_logs" AND (uri="/edit_page" OR uri="*edit*php") AND (method="POST" AND file_extension=".php")

🔗 References

📤 Share & Export