CVE-2022-24977
high-risk
Published 2022-02-14
ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.
Do I need to act?
!
28.1% chance of exploitation in next 30 days
EPSS score — higher than 72% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
+
Fix available
Upgrade to: 2e3f2b3963ebfa4e5dcaf50c31ff4daa1eb901be, a66d7bb499faafab803e24833606028fa0ba4261
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Exploit
https://r0.haxors.org/posts?id=8
Exploit
https://r0.haxors.org/posts?id=8
52
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
15/34 · Moderate
Exposure
5/34 · Minimal