Skip to main content

CVE-2022-43140: n/a in n/a

High
VulnerabilityCVE-2022-43140cvecve-2022-43140
Published: Thu Nov 17 2022 (11/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

kkFileView v4.1.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component cn.keking.web.controller.OnlinePreviewController#getCorsFile. This vulnerability allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the url parameter.

AI-Powered Analysis

AILast updated: 07/02/2025, 04:43:11 UTC

Technical Analysis

CVE-2022-43140 is a high-severity Server-Side Request Forgery (SSRF) vulnerability identified in kkFileView version 4.1.0. The vulnerability exists in the OnlinePreviewController component, specifically in the getCorsFile method, which processes user-supplied URLs via the 'url' parameter. An attacker can exploit this flaw by injecting crafted URLs, causing the server to make arbitrary HTTP requests on behalf of the attacker. SSRF vulnerabilities like this can be leveraged to access internal systems, bypass firewalls, or interact with otherwise inaccessible services within the victim's network. Although the vulnerability does not directly impact confidentiality (CVSS indicates no confidentiality loss), it has a significant impact on integrity, as attackers can manipulate server behavior to perform unauthorized actions or gather sensitive information indirectly. The CVSS score of 7.5 reflects the ease of exploitation (no privileges or user interaction required) and the potential for impactful misuse. No known public exploits are reported yet, and no patches have been linked, indicating that organizations using kkFileView 4.1.0 should urgently assess exposure and apply mitigations. The vulnerability is classified under CWE-918, which relates to SSRF issues where an attacker can abuse server functionality to induce requests to unintended locations.

Potential Impact

For European organizations, exploitation of this SSRF vulnerability could lead to unauthorized internal network reconnaissance, data manipulation, or pivoting attacks within corporate environments. Since kkFileView is a document preview and management tool, attackers might leverage SSRF to access internal document repositories, metadata services, or other sensitive internal endpoints. This could result in exposure or alteration of confidential documents, undermining data integrity and potentially violating data protection regulations such as GDPR. Additionally, SSRF can be a stepping stone for more complex attacks, including lateral movement or privilege escalation within enterprise networks. The lack of authentication or user interaction required for exploitation increases the risk of automated attacks targeting exposed kkFileView instances. European organizations with publicly accessible kkFileView deployments or insufficient network segmentation are particularly vulnerable to such threats, which could disrupt business operations or lead to reputational damage.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the kkFileView application to trusted networks or VPNs to reduce exposure. 2. Implement strict input validation and sanitization on the 'url' parameter in the getCorsFile method to ensure only allowed domains or IP addresses can be requested, employing allowlists rather than blocklists. 3. Deploy network-level controls such as egress filtering and firewall rules to prevent the server from making unauthorized outbound requests, especially to internal IP ranges and sensitive services. 4. Monitor application logs for unusual outbound request patterns that may indicate exploitation attempts. 5. If possible, upgrade to a patched version of kkFileView once available or apply vendor-provided patches promptly. 6. Conduct a thorough security review of all components that accept URLs or external inputs to prevent similar SSRF issues. 7. Employ Web Application Firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense. 8. Educate development teams on secure coding practices related to SSRF and input validation to prevent recurrence.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee200

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 7/2/2025, 4:43:11 AM

Last updated: 7/29/2025, 8:33:33 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats