First published: Wed Nov 09 2022(Updated: )
Roxy Fileman 1.4.6 allows Remote Code Execution via a .phar upload, because the default FORBIDDEN_UPLOADS value in conf.json only blocks .php, .php4, and .php5 files. (Visiting any .phar file invokes the PHP interpreter in some realistic web-server configurations.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Brakeman | =1.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40797 has a critical severity rating as it allows remote code execution due to improper file upload restrictions.
To mitigate CVE-2022-40797, configure the FORBIDDEN_UPLOADS setting in conf.json to block .phar file uploads.
The potential impacts of CVE-2022-40797 include unauthorized remote code execution, which could lead to complete system compromise.
Roxy Fileman version 1.4.6 is affected by CVE-2022-40797.
Yes, CVE-2022-40797 is particularly relevant in web server configurations that invoke the PHP interpreter for .phar files.