Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-30529: n/a in n/a

0
High
VulnerabilityCVE-2022-30529cvecve-2022-30529
Published: Tue Nov 22 2022 (11/22/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

File upload vulnerability in asith-eranga ISIC tour booking through version published on Feb 13th 2018, allows attackers to upload arbitrary files via /system/application/libs/js/tinymce/plugins/filemanager/dialog.php and /system/application/libs/js/tinymce/plugins/filemanager/upload.php.

AI-Powered Analysis

AILast updated: 06/22/2025, 07:35:58 UTC

Technical Analysis

CVE-2022-30529 is a file upload vulnerability identified in the asith-eranga ISIC tour booking system, specifically in versions published up to February 13, 2018. The vulnerability exists in the file upload functionality exposed via the TinyMCE file manager plugin endpoints: /system/application/libs/js/tinymce/plugins/filemanager/dialog.php and /system/application/libs/js/tinymce/plugins/filemanager/upload.php. This flaw allows an attacker with high privileges (PR:H) to upload arbitrary files to the server without requiring user interaction (UI:N). The vulnerability is classified under CWE-434, which pertains to unrestricted file upload vulnerabilities. Exploiting this vulnerability can lead to full compromise of the affected system, as arbitrary files uploaded could include web shells or malicious scripts that impact confidentiality, integrity, and availability. The CVSS v3.1 base score is 7.2 (high severity), with vector AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating network attack vector, low attack complexity, but requiring high privileges, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No patches or vendor information are currently available, and no known exploits in the wild have been reported. The vulnerability affects a niche product used for tour booking, which may be deployed in specific organizations or regions. Given the nature of the vulnerability, attackers with elevated access could leverage it to escalate privileges or maintain persistence by uploading malicious payloads to the web server environment.

Potential Impact

For European organizations using the asith-eranga ISIC tour booking system, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized code execution, data theft, defacement, or service disruption. Confidential customer data, including personal and payment information, could be exposed or manipulated, leading to regulatory non-compliance under GDPR. The integrity of booking data and availability of the service could be compromised, impacting business operations and customer trust. Since the vulnerability requires high privileges, it implies that an attacker must first gain elevated access, possibly through other vulnerabilities or insider threats, making it a critical post-compromise vector. Organizations in the tourism sector, travel agencies, or related service providers in Europe that rely on this system are at risk of targeted attacks aiming to disrupt services or exfiltrate sensitive data. The absence of patches increases the window of exposure, and the lack of known exploits does not preclude future exploitation, especially if threat actors develop weaponized payloads.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting access to the vulnerable endpoints (/dialog.php and /upload.php) via network-level controls such as IP whitelisting or web application firewalls (WAF) with custom rules to block unauthorized file upload attempts. 2. Conduct a thorough privilege audit to ensure that only trusted users have high-level access to the system, minimizing the risk of privilege abuse. 3. Implement strict file upload validation and sanitization controls, including limiting allowed file types, enforcing file size limits, and scanning uploaded files with antivirus or malware detection solutions. 4. If possible, isolate the affected application in a segmented network zone to limit lateral movement in case of compromise. 5. Monitor logs for suspicious upload activities or anomalous file creations in the application directories. 6. Develop an incident response plan specific to this vulnerability, including steps for containment and recovery. 7. Engage with the software provider or community to seek patches or updates; if unavailable, consider migrating to alternative, actively maintained booking systems. 8. Regularly back up critical data and verify backup integrity to enable recovery from potential ransomware or destructive attacks leveraging this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-05-10T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef46a

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/22/2025, 7:35:58 AM

Last updated: 2/7/2026, 10:06:59 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats