CVE-2024-22567

8.8 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary files to MCMS 5.3.5 systems via a crafted POST request to /ms/file/upload.do. Attackers can potentially upload malicious files like webshells to gain remote code execution. All systems running MCMS 5.3.5 with the vulnerable endpoint accessible are affected.

💻 Affected Systems

Products:
  • MCMS
Versions: 5.3.5
Operating Systems: All platforms running MCMS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the file upload functionality at /ms/file/upload.do; any system with this endpoint accessible is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via webshell upload leading to remote code execution, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Attackers upload webshells to gain persistent access, deface websites, or deploy ransomware payloads.

🟢

If Mitigated

File uploads are blocked or properly validated, limiting impact to denial of service if upload attempts overwhelm the system.

🌐 Internet-Facing: HIGH - The vulnerability requires only a crafted POST request and is exploitable without authentication, making internet-facing instances prime targets.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but require network access; risk increases if internal users can reach the endpoint.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only crafting a POST request with malicious file content; public references suggest proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch is available; monitor the MCMS vendor for updates and apply immediately when released.

🔧 Temporary Workarounds

Block Vulnerable Endpoint

all

Use web application firewall (WAF) or reverse proxy rules to block access to /ms/file/upload.do.

# Example for Apache: RewriteRule ^/ms/file/upload\.do$ - [F]
# Example for Nginx: location ~ ^/ms/file/upload\.do$ { deny all; }

Implement File Upload Validation

all

Add server-side validation to restrict file types, extensions, and content; store uploaded files outside web root.

# Custom implementation required in MCMS codebase

🧯 If You Can't Patch

  • Isolate the MCMS system in a segmented network to limit lateral movement if compromised.
  • Implement strict monitoring and alerting for file upload activities and unexpected file creations.

🔍 How to Verify

Check if Vulnerable:

Attempt to upload a test file (e.g., harmless .txt) via POST to http://[target]/ms/file/upload.do; if successful without authentication, the system is vulnerable.

Check Version:

Check MCMS version in admin panel or configuration files; default location may vary.

Verify Fix Applied:

After applying workarounds, test the upload endpoint again; successful uploads should be blocked or properly validated.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /ms/file/upload.do with unusual file extensions (e.g., .jsp, .php, .asp)
  • File creation events in web directories with suspicious names

Network Indicators:

  • Unusual outbound connections from the MCMS server post-upload
  • Spikes in traffic to the upload endpoint

SIEM Query:

source="web_logs" AND uri_path="/ms/file/upload.do" AND http_method="POST"

🔗 References

📤 Share & Export