CVE-2022-43140: n/a in n/a
kkFileView v4.1.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component cn.keking.web.controller.OnlinePreviewController#getCorsFile. This vulnerability allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the url parameter.
AI Analysis
Technical Summary
CVE-2022-43140 is a high-severity Server-Side Request Forgery (SSRF) vulnerability identified in kkFileView version 4.1.0. The vulnerability exists in the OnlinePreviewController component, specifically in the getCorsFile method, which processes user-supplied URLs via the 'url' parameter. An attacker can exploit this flaw by injecting crafted URLs, causing the server to make arbitrary HTTP requests on behalf of the attacker. SSRF vulnerabilities like this can be leveraged to access internal systems, bypass firewalls, or interact with otherwise inaccessible services within the victim's network. Although the vulnerability does not directly impact confidentiality (CVSS indicates no confidentiality loss), it has a significant impact on integrity, as attackers can manipulate server behavior to perform unauthorized actions or gather sensitive information indirectly. The CVSS score of 7.5 reflects the ease of exploitation (no privileges or user interaction required) and the potential for impactful misuse. No known public exploits are reported yet, and no patches have been linked, indicating that organizations using kkFileView 4.1.0 should urgently assess exposure and apply mitigations. The vulnerability is classified under CWE-918, which relates to SSRF issues where an attacker can abuse server functionality to induce requests to unintended locations.
Potential Impact
For European organizations, exploitation of this SSRF vulnerability could lead to unauthorized internal network reconnaissance, data manipulation, or pivoting attacks within corporate environments. Since kkFileView is a document preview and management tool, attackers might leverage SSRF to access internal document repositories, metadata services, or other sensitive internal endpoints. This could result in exposure or alteration of confidential documents, undermining data integrity and potentially violating data protection regulations such as GDPR. Additionally, SSRF can be a stepping stone for more complex attacks, including lateral movement or privilege escalation within enterprise networks. The lack of authentication or user interaction required for exploitation increases the risk of automated attacks targeting exposed kkFileView instances. European organizations with publicly accessible kkFileView deployments or insufficient network segmentation are particularly vulnerable to such threats, which could disrupt business operations or lead to reputational damage.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the kkFileView application to trusted networks or VPNs to reduce exposure. 2. Implement strict input validation and sanitization on the 'url' parameter in the getCorsFile method to ensure only allowed domains or IP addresses can be requested, employing allowlists rather than blocklists. 3. Deploy network-level controls such as egress filtering and firewall rules to prevent the server from making unauthorized outbound requests, especially to internal IP ranges and sensitive services. 4. Monitor application logs for unusual outbound request patterns that may indicate exploitation attempts. 5. If possible, upgrade to a patched version of kkFileView once available or apply vendor-provided patches promptly. 6. Conduct a thorough security review of all components that accept URLs or external inputs to prevent similar SSRF issues. 7. Employ Web Application Firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense. 8. Educate development teams on secure coding practices related to SSRF and input validation to prevent recurrence.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-43140: n/a in n/a
Description
kkFileView v4.1.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component cn.keking.web.controller.OnlinePreviewController#getCorsFile. This vulnerability allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the url parameter.
AI-Powered Analysis
Technical Analysis
CVE-2022-43140 is a high-severity Server-Side Request Forgery (SSRF) vulnerability identified in kkFileView version 4.1.0. The vulnerability exists in the OnlinePreviewController component, specifically in the getCorsFile method, which processes user-supplied URLs via the 'url' parameter. An attacker can exploit this flaw by injecting crafted URLs, causing the server to make arbitrary HTTP requests on behalf of the attacker. SSRF vulnerabilities like this can be leveraged to access internal systems, bypass firewalls, or interact with otherwise inaccessible services within the victim's network. Although the vulnerability does not directly impact confidentiality (CVSS indicates no confidentiality loss), it has a significant impact on integrity, as attackers can manipulate server behavior to perform unauthorized actions or gather sensitive information indirectly. The CVSS score of 7.5 reflects the ease of exploitation (no privileges or user interaction required) and the potential for impactful misuse. No known public exploits are reported yet, and no patches have been linked, indicating that organizations using kkFileView 4.1.0 should urgently assess exposure and apply mitigations. The vulnerability is classified under CWE-918, which relates to SSRF issues where an attacker can abuse server functionality to induce requests to unintended locations.
Potential Impact
For European organizations, exploitation of this SSRF vulnerability could lead to unauthorized internal network reconnaissance, data manipulation, or pivoting attacks within corporate environments. Since kkFileView is a document preview and management tool, attackers might leverage SSRF to access internal document repositories, metadata services, or other sensitive internal endpoints. This could result in exposure or alteration of confidential documents, undermining data integrity and potentially violating data protection regulations such as GDPR. Additionally, SSRF can be a stepping stone for more complex attacks, including lateral movement or privilege escalation within enterprise networks. The lack of authentication or user interaction required for exploitation increases the risk of automated attacks targeting exposed kkFileView instances. European organizations with publicly accessible kkFileView deployments or insufficient network segmentation are particularly vulnerable to such threats, which could disrupt business operations or lead to reputational damage.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the kkFileView application to trusted networks or VPNs to reduce exposure. 2. Implement strict input validation and sanitization on the 'url' parameter in the getCorsFile method to ensure only allowed domains or IP addresses can be requested, employing allowlists rather than blocklists. 3. Deploy network-level controls such as egress filtering and firewall rules to prevent the server from making unauthorized outbound requests, especially to internal IP ranges and sensitive services. 4. Monitor application logs for unusual outbound request patterns that may indicate exploitation attempts. 5. If possible, upgrade to a patched version of kkFileView once available or apply vendor-provided patches promptly. 6. Conduct a thorough security review of all components that accept URLs or external inputs to prevent similar SSRF issues. 7. Employ Web Application Firewalls (WAFs) with SSRF detection capabilities to provide an additional layer of defense. 8. Educate development teams on secure coding practices related to SSRF and input validation to prevent recurrence.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-17T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbee200
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 7/2/2025, 4:43:11 AM
Last updated: 7/29/2025, 8:33:33 AM
Views: 7
Related Threats
CVE-2025-8991: Business Logic Errors in linlinjava litemall
MediumCVE-2025-8990: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-8940: Buffer Overflow in Tenda AC20
HighCVE-2025-8939: Buffer Overflow in Tenda AC20
HighCVE-2025-50518: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.