CVE-2023-36969

8.8 HIGH

📋 TL;DR

CMS Made Simple v2.2.17 contains an authenticated file upload vulnerability that allows remote attackers to upload malicious files and execute arbitrary commands on the server. This affects any system running the vulnerable version with file upload functionality enabled. Attackers must have valid administrator credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • CMS Made Simple
Versions: v2.2.17 specifically
Operating Systems: All operating systems running CMS Made Simple
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated admin access to the file manager module. File upload functionality must be enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, install malware, steal data, and pivot to other systems on the network.

🟠

Likely Case

Attackers with admin credentials upload webshells or malicious scripts to gain persistent access, deface websites, or steal sensitive data.

🟢

If Mitigated

With proper access controls and file upload restrictions, impact is limited to unauthorized file uploads without code execution.

🌐 Internet-Facing: HIGH - Internet-facing CMS instances are directly accessible to attackers who obtain or guess admin credentials.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but require attackers to first gain network access or compromise admin credentials.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is straightforward once authenticated. Public exploit details and proof-of-concept are available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.2.18 or later

Vendor Advisory: https://forum.cmsmadesimple.org/viewtopic.php?f=1&t=84685

Restart Required: No

Instructions:

1. Backup your CMS Made Simple installation and database. 2. Download the latest version from the official website. 3. Replace all files with the new version, preserving your configuration files. 4. Run the upgrade script if prompted. 5. Verify the installation works correctly.

🔧 Temporary Workarounds

Disable File Upload Module

all

Temporarily disable the file upload functionality in CMS Made Simple to prevent exploitation.

Navigate to Extensions > Modules, find File Manager module, click Disable

Restrict File Upload Types

all

Configure the file manager to only allow specific safe file extensions.

In File Manager settings, restrict allowed extensions to: jpg,jpeg,png,gif,pdf,doc,docx,txt

🧯 If You Can't Patch

  • Implement strict access controls and multi-factor authentication for all admin accounts
  • Deploy a web application firewall (WAF) with rules to block malicious file uploads and command execution attempts

🔍 How to Verify

Check if Vulnerable:

Check the CMS version in the admin panel under Site Admin > About CMS Made Simple. If version is exactly 2.2.17, the system is vulnerable.

Check Version:

Check the CMS version in the admin interface or examine the file /version.php in the installation directory.

Verify Fix Applied:

After updating, verify the version shows 2.2.18 or higher in the admin panel. Test file upload functionality with restricted file types.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with executable extensions (.php, .jsp, .asp)
  • Multiple failed login attempts followed by successful admin login
  • File uploads to unusual directories
  • Commands executed via uploaded files in web server logs

Network Indicators:

  • HTTP POST requests to file upload endpoints with executable content
  • Outbound connections from the CMS server to suspicious IPs after file uploads

SIEM Query:

source="web_server_logs" AND (uri_path="/admin/filemanager/browser.php" OR uri_path="/admin/filemanager/upload.php") AND (status=200 OR status=302) AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp")

🔗 References

📤 Share & Export