Skip to main content

CVE-2022-40443: n/a in n/a

Medium
VulnerabilityCVE-2022-40443cvecve-2022-40443
Published: Thu Sep 22 2022 (09/22/2022, 13:32:34 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

An absolute path traversal vulnerability in ZZCMS 2022 allows attackers to obtain sensitive information via a crafted GET request sent to /one/siteinfo.php.

AI-Powered Analysis

AILast updated: 07/06/2025, 03:11:30 UTC

Technical Analysis

CVE-2022-40443 is an absolute path traversal vulnerability identified in ZZCMS 2022, a content management system. This vulnerability allows an attacker to craft a specially designed GET request targeting the /one/siteinfo.php endpoint. By exploiting this flaw, the attacker can manipulate the file path input to access files outside the intended directory scope, thereby obtaining sensitive information stored on the server. The vulnerability is categorized under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), indicating a failure to properly sanitize or validate user-supplied file paths. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality (C:L) without affecting integrity or availability. No patches or vendor advisories are currently listed, and there are no known exploits in the wild at this time. The lack of detailed vendor or product version information limits the ability to assess the full scope of affected deployments, but the vulnerability fundamentally allows unauthorized reading of files, which can lead to information disclosure and potential further exploitation if sensitive configuration or credential files are accessed.

Potential Impact

For European organizations using ZZCMS 2022, this vulnerability poses a risk of unauthorized disclosure of sensitive information such as configuration files, credentials, or other protected data stored on the web server. Such information leakage could facilitate further attacks like privilege escalation, lateral movement, or data exfiltration. Given the medium severity and network accessibility without authentication, attackers can remotely exploit this vulnerability without user interaction, increasing the risk profile. Organizations in sectors with strict data protection requirements (e.g., finance, healthcare, government) could face compliance issues under GDPR if sensitive personal data is exposed. Additionally, the exposure of internal system details could aid attackers in crafting more targeted attacks. Although no known exploits are reported, the presence of this vulnerability in a web-facing CMS component makes it a potential target for opportunistic attackers scanning for vulnerable installations.

Mitigation Recommendations

European organizations should immediately audit their use of ZZCMS 2022 and identify any instances of the /one/siteinfo.php endpoint. Specific mitigations include: 1) Implement strict input validation and sanitization on all file path parameters to prevent traversal sequences (e.g., ../). 2) Restrict file access to a designated safe directory using secure coding practices such as realpath checks and canonicalization. 3) Employ web application firewalls (WAFs) with rules to detect and block path traversal patterns in HTTP requests. 4) Limit the web server's file system permissions to prevent unauthorized file reads beyond necessary directories. 5) Monitor web server logs for suspicious GET requests targeting /one/siteinfo.php or containing traversal payloads. 6) If possible, update or patch ZZCMS to a version that addresses this vulnerability once available. 7) Consider isolating or disabling the vulnerable endpoint if it is not essential for operations. These measures go beyond generic advice by focusing on the specific vulnerable endpoint and the nature of the path traversal attack.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835e83c182aa0cae219e1b1

Added to database: 5/27/2025, 4:28:44 PM

Last enriched: 7/6/2025, 3:11:30 AM

Last updated: 8/15/2025, 8:01:50 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats