CVE-2025-69770

10.0 CRITICAL

📋 TL;DR

This zip slip vulnerability in MojoPortal CMS allows attackers to upload malicious zip files that extract to arbitrary locations on the server, potentially leading to remote code execution. Any MojoPortal installation with the vulnerable endpoint accessible is affected, particularly those allowing file uploads.

💻 Affected Systems

Products:
  • MojoPortal CMS
Versions: v2.9.0.1
Operating Systems: All platforms running MojoPortal
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the /DesignTools/SkinList.aspx endpoint, which may require authentication depending on configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary command execution, allowing attackers to install backdoors, steal data, or pivot to other systems.

🟠

Likely Case

Webshell deployment leading to data exfiltration, defacement, or further network reconnaissance.

🟢

If Mitigated

File upload restricted to authenticated users with proper input validation and path traversal checks.

🌐 Internet-Facing: HIGH - The vulnerable endpoint is part of a web CMS typically exposed to the internet.
🏢 Internal Only: MEDIUM - Internal systems could still be compromised if attackers gain initial access through other means.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting a malicious zip file with directory traversal paths and uploading it to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v2.9.1

Vendor Advisory: https://www.mojoportal.com/mojoportal-2-9-1

Restart Required: No

Instructions:

1. Backup your current MojoPortal installation. 2. Download MojoPortal v2.9.1 from the official website. 3. Replace the vulnerable files with the patched version. 4. Verify the /DesignTools/SkinList.aspx endpoint now validates zip file extraction paths.

🔧 Temporary Workarounds

Disable SkinList Endpoint

all

Temporarily disable or restrict access to the vulnerable endpoint until patching is complete.

Modify web.config to restrict access to /DesignTools/SkinList.aspx

Implement File Upload Restrictions

all

Add web application firewall rules or input validation to block zip files with directory traversal sequences.

Add WAF rule: deny requests containing '..' or '../' in file upload parameters

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MojoPortal servers from critical systems.
  • Deploy file integrity monitoring to detect unauthorized file writes outside expected directories.

🔍 How to Verify

Check if Vulnerable:

Check if MojoPortal version is 2.9.0.1 and the /DesignTools/SkinList.aspx endpoint is accessible.

Check Version:

Check the web.config or About page in MojoPortal admin panel for version information.

Verify Fix Applied:

After updating to v2.9.1, attempt to upload a test zip file with traversal paths - it should be rejected.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed upload attempts to /DesignTools/SkinList.aspx
  • Unusual file write operations outside expected directories
  • Webshell creation in web-accessible directories

Network Indicators:

  • POST requests to /DesignTools/SkinList.aspx with zip file uploads
  • Subsequent outbound connections from the MojoPortal server to unknown IPs

SIEM Query:

source="web_server" AND (url="/DesignTools/SkinList.aspx" AND method="POST" AND file_extension="zip")

🔗 References

📤 Share & Export