| [Japanese] | 
| JVNDB-2022-000069 | 
| PowerCMS XMLRPC API vulnerable to command injection | 
|
| 
 
PowerCMS XMLRPC API provided by Alfasado Inc. contains a command injection vulnerability (CWE-74).Sending a specially crafted message by POST method to PowerCMS XMLRPC API may allow arbitrary Perl script execution, and an arbitrary OS command may be executed through it.
 According to the developer, it is unable to execute a command with an arbitrary value added to its argument, even if the vulnerability is exploited.
 
 Alfasado Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Alfasado Inc. coordinated under the Information Security Early Warning Partnership.
 | 
|
| 
 
  CVSS V3 Severity:Base Metrics 9.8 (Critical) [IPA Score]
 
    Attack Vector: NetworkAttack Complexity: LowPrivileges Required: NoneUser Interaction: NoneScope: UnchangedConfidentiality Impact: HighIntegrity Impact: HighAvailability Impact: High 
  CVSS V2 Severity:Base Metrics 7.5 (High) [IPA Score]
 
    Access Vector: NetworkAccess Complexity: LowAuthentication: NoneConfidentiality Impact: PartialIntegrity Impact: PartialAvailability Impact: Partial 
  
 | 
|
| 
 
	
 | 
| 
 
	Alfasado Inc.
	
		PowerCMS 6.021 and earlier (PowerCMS 6 Series)PowerCMS 5.21 and earlier (PowerCMS 5 Series)PowerCMS 4.51 and earlier (PowerCMS 4 Series) | 
| 
 
	The developer states that PowerCMS 3 Series and earlier, which are unsupported (End-of-Life, EOL) versions, are affected too.
 | 
|
| 
 
An arbitrary Perl script may be executed by a remote attacker. As a result, an arbitrary OS command may be executed.
 | 
|
| 
 
[When XMLRPC API is NOT required: Disable XMLRPC API]
 
 If XMLRPC API is used as CGI/FastCGI
 
 Delete mt-xmlrpc.cgior remove execute permission ofmt-xmlrpc.cgi
 
 According to the developer, when PowerCMS environment variable XMLRPCScriptis configured, the file may be renamed. In that case, implement this countermeasure to that renamed file
 
 
 If XMLRPC API is used as PSGI
 
 Configure environment variable RestrictedPSGIApp to prohibit XMLRPC application:RestrictedPSGIApp xmlrpc
 
 [When XMLRPC API should be kept available: Apply the patch]
 Apply the patch according to the information provided by the developer.
 | 
|
| 
 
	Alfasado Inc.
	
 | 
|
| 
 
	No Mapping(CWE-Other) [IPA Evaluation] | 
|
| 
 
	CVE-2022-33941  | 
|
| 
 
	JVN : JVN#76024879 National Vulnerability Database (NVD) : CVE-2022-33941  | 
|
| 
 
	[2022/09/02]Web page was published
[2024/06/13]References : Content was added
 
 
 |