First published: Fri Mar 11 2022(Updated: )
Abusing Backup/Restore feature to achieve Remote Code Execution in GitHub repository microweber/microweber prior to 1.2.12.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Microweber Microweber | <1.2.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-0921 is high with a CVSS score of 6.7.
An attacker can exploit CVE-2022-0921 by abusing the Backup/Restore feature in the vulnerable version of Microweber to achieve remote code execution.
Microweber version prior to 1.2.12 is affected by CVE-2022-0921.
To fix CVE-2022-0921, it is recommended to update Microweber to version 1.2.12 or later.
You can find more information about CVE-2022-0921 in the references provided: [link1](https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318), [link2](https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622).