Skip to main content

CVE-2022-45968: n/a in n/a

High
VulnerabilityCVE-2022-45968cvecve-2022-45968n-acwe-434
Published: Mon Dec 12 2022 (12/12/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one).

AI-Powered Analysis

AILast updated: 06/21/2025, 16:53:19 UTC

Technical Analysis

CVE-2022-45968 is a high-severity vulnerability affecting Alist version 3.4.0, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). The vulnerability allows a user who has file upload permissions to upload arbitrary files to any folder within the application, including those that are password protected. This means that even users with limited privileges can bypass intended access controls and place files in restricted directories. The vulnerability does not require user interaction beyond the upload permission, and the attack vector is network-based (AV:N), with low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H), as malicious files could be uploaded to execute arbitrary code, overwrite critical files, or disrupt service. The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component. The CVSS 3.1 base score is 8.8, indicating a high severity. No patches or vendor-specific mitigations are currently listed, and no known exploits in the wild have been reported. The vulnerability is significant because it allows privilege escalation within the application context by abusing file upload functionality, potentially leading to remote code execution or data compromise if exploited.

Potential Impact

For European organizations using Alist 3.4.0, this vulnerability poses a serious risk. Organizations relying on Alist for file management or sharing could face unauthorized data exposure or modification, especially if sensitive or regulated data is stored in password-protected folders. The ability to upload arbitrary files to protected directories could lead to deployment of web shells, malware, or ransomware, resulting in data breaches, service disruption, or lateral movement within networks. This is particularly critical for sectors handling sensitive personal data under GDPR, such as healthcare, finance, and government agencies. The compromise of confidentiality and integrity could lead to regulatory penalties and reputational damage. Additionally, availability impacts could disrupt business operations. Since the vulnerability requires only file upload permission, insider threats or compromised low-privilege accounts could be leveraged by attackers to exploit this vulnerability.

Mitigation Recommendations

1. Immediately restrict file upload permissions to only fully trusted users and review current user roles to minimize exposure. 2. Implement strict server-side validation and sanitization of uploaded files, including file type whitelisting and scanning for malicious content. 3. Isolate file upload directories from execution contexts by disabling execution permissions on upload folders to prevent execution of malicious scripts. 4. Employ network segmentation and access controls to limit exposure of Alist instances, especially those accessible from the internet. 5. Monitor file upload activity and audit logs for unusual or unauthorized uploads, focusing on uploads to password-protected or sensitive directories. 6. If possible, upgrade to a patched version once available or apply vendor-provided mitigations. 7. Use web application firewalls (WAFs) to detect and block suspicious upload patterns. 8. Educate users about the risks of file uploads and enforce strong authentication and session management to reduce risk of account compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-11-28T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9848c4522896dcbf5dad

Added to database: 5/21/2025, 9:09:28 AM

Last enriched: 6/21/2025, 4:53:19 PM

Last updated: 7/31/2025, 3:54:47 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats