CVE-2024-28187
📋 TL;DR
SOY CMS versions before 3.14.2 contain an OS command injection vulnerability in the file upload feature. Administrators can exploit this by uploading files with specially crafted names containing semicolons, allowing arbitrary command execution through the jpegoptim functionality. This affects all SOY CMS installations with vulnerable versions where administrators can upload files.
💻 Affected Systems
- SOY CMS
📦 What is this software?
Soy Cms by Saitodev
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise allowing attackers to execute arbitrary commands as the web server user, potentially leading to data theft, ransomware deployment, or complete system takeover.
Likely Case
Attackers with administrator access could execute commands to steal sensitive data, install backdoors, or pivot to other systems on the network.
If Mitigated
With proper network segmentation and least privilege, impact could be limited to the web application directory and web server user permissions.
🎯 Exploit Status
Exploitation requires administrator credentials. The vulnerability is straightforward to exploit once authenticated as an administrator.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.14.2
Vendor Advisory: https://github.com/inunosinsi/soycms/security/advisories/GHSA-qg3q-hfgc-5jmm
Restart Required: No
Instructions:
1. Backup your SOY CMS installation and database. 2. Download SOY CMS version 3.14.2 or later from the official repository. 3. Replace the existing installation with the updated version. 4. Verify the patch is applied by checking the version.
🧯 If You Can't Patch
- Restrict administrator access to only trusted users and implement strict monitoring of administrator activities.
- Disable file upload functionality or implement strict filename validation at the web application firewall level.
🔍 How to Verify
Check if Vulnerable:
Check the SOY CMS version in the administration panel or by examining the SOY CMS files. If version is below 3.14.2, the system is vulnerable.
Check Version:
Check the version in the SOY CMS administration interface or examine the SOY CMS configuration files.
Verify Fix Applied:
After upgrading, verify the version shows 3.14.2 or higher in the administration panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads with special characters in filenames
- Suspicious command execution patterns in web server logs
- Multiple failed upload attempts with crafted filenames
Network Indicators:
- Unusual outbound connections from the web server
- Suspicious payloads in HTTP POST requests to upload endpoints
SIEM Query:
source="web_server_logs" AND (uri_path="/admin/upload" OR uri_path="/upload") AND (filename CONTAINS ";" OR filename CONTAINS "$" OR filename CONTAINS "`")
🔗 References
- https://github.com/inunosinsi/soycms/commit/9b0e452f628df28dec69cd72b6b55db21066cbf8
- https://github.com/inunosinsi/soycms/security/advisories/GHSA-qg3q-hfgc-5jmm
- https://github.com/inunosinsi/soycms/commit/9b0e452f628df28dec69cd72b6b55db21066cbf8
- https://github.com/inunosinsi/soycms/security/advisories/GHSA-qg3q-hfgc-5jmm