CVE-2024-28187

7.2 HIGH

📋 TL;DR

SOY CMS versions before 3.14.2 contain an OS command injection vulnerability in the file upload feature. Administrators can exploit this by uploading files with specially crafted names containing semicolons, allowing arbitrary command execution through the jpegoptim functionality. This affects all SOY CMS installations with vulnerable versions where administrators can upload files.

💻 Affected Systems

Products:
  • SOY CMS
Versions: All versions prior to 3.14.2
Operating Systems: Any OS running SOY CMS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator access to exploit. The vulnerability is in the file upload feature when using jpegoptim functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing attackers to execute arbitrary commands as the web server user, potentially leading to data theft, ransomware deployment, or complete system takeover.

🟠

Likely Case

Attackers with administrator access could execute commands to steal sensitive data, install backdoors, or pivot to other systems on the network.

🟢

If Mitigated

With proper network segmentation and least privilege, impact could be limited to the web application directory and web server user permissions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials. The vulnerability is straightforward to exploit once authenticated as an administrator.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.14.2

Vendor Advisory: https://github.com/inunosinsi/soycms/security/advisories/GHSA-qg3q-hfgc-5jmm

Restart Required: No

Instructions:

1. Backup your SOY CMS installation and database. 2. Download SOY CMS version 3.14.2 or later from the official repository. 3. Replace the existing installation with the updated version. 4. Verify the patch is applied by checking the version.

🧯 If You Can't Patch

  • Restrict administrator access to only trusted users and implement strict monitoring of administrator activities.
  • Disable file upload functionality or implement strict filename validation at the web application firewall level.

🔍 How to Verify

Check if Vulnerable:

Check the SOY CMS version in the administration panel or by examining the SOY CMS files. If version is below 3.14.2, the system is vulnerable.

Check Version:

Check the version in the SOY CMS administration interface or examine the SOY CMS configuration files.

Verify Fix Applied:

After upgrading, verify the version shows 3.14.2 or higher in the administration panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with special characters in filenames
  • Suspicious command execution patterns in web server logs
  • Multiple failed upload attempts with crafted filenames

Network Indicators:

  • Unusual outbound connections from the web server
  • Suspicious payloads in HTTP POST requests to upload endpoints

SIEM Query:

source="web_server_logs" AND (uri_path="/admin/upload" OR uri_path="/upload") AND (filename CONTAINS ";" OR filename CONTAINS "$" OR filename CONTAINS "`")

🔗 References

📤 Share & Export