CVE-2026-1061

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to upload arbitrary files to xiweicheng TMS systems without proper restrictions. Attackers can exploit this to upload malicious files like webshells or malware. All systems running xiweicheng TMS up to version 2.28.0 are affected.

💻 Affected Systems

Products:
  • xiweicheng TMS
Versions: Up to 2.28.0
Operating Systems: Any OS running Java applications
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the vulnerable FileController.java component are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via webshell upload leading to remote code execution, data theft, and lateral movement within the network.

🟠

Likely Case

Attackers upload webshells to gain persistent access, deface websites, or deploy ransomware payloads.

🟢

If Mitigated

File uploads are blocked or properly validated, preventing malicious file execution.

🌐 Internet-Facing: HIGH - Remote exploitation allows direct attacks from anywhere on the internet.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this if they have network access to the system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details exist in GitHub repositories, making this easily exploitable by attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

1. Check for updated version beyond 2.28.0 from vendor. 2. If available, backup configuration and data. 3. Deploy updated version. 4. Restart application services. 5. Verify fix by testing file upload restrictions.

🔧 Temporary Workarounds

Web Application Firewall Rules

all

Block malicious file uploads at the WAF level by filtering upload requests containing dangerous file extensions.

File Upload Restriction

all

Configure the application server to restrict uploads to specific directories with execute permissions disabled.

🧯 If You Can't Patch

  • Implement strict file type validation in the FileController.java component to only allow safe extensions.
  • Deploy network segmentation to isolate the TMS system from critical infrastructure.

🔍 How to Verify

Check if Vulnerable:

Check if running xiweicheng TMS version 2.28.0 or earlier by examining application version files or deployment manifests.

Check Version:

Check application.properties or similar configuration files for version information.

Verify Fix Applied:

Test file upload functionality with malicious file extensions - successful uploads indicate vulnerability.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads with suspicious extensions (.jsp, .php, .exe)
  • Multiple failed upload attempts followed by successful upload

Network Indicators:

  • HTTP POST requests to upload endpoints with unusual file types
  • Traffic spikes to upload functionality

SIEM Query:

source="web_server" AND (uri="/upload" OR uri="/file/upload") AND (file_extension="jsp" OR file_extension="php" OR file_extension="exe")

🔗 References

📤 Share & Export