← Voltar para CVEs
CVE-2022-50992
HIGH7.5
Descricao
Weaver (Fanwei) E-cology 9.5 versions prior to 10.52 contain an arbitrary file read vulnerability in the XmlRpcServlet interface at the XML-RPC endpoint that allows unauthenticated remote attackers to read arbitrary files by supplying file paths to the WorkflowService.getAttachment and WorkflowService.LoadTemplateProp methods. Attackers can exploit these methods without authentication to retrieve sensitive files including system configuration files and database credentials from the server. Exploitation evidence was first observed by the Shadowserver Foundation on 2022-12-14 (UTC).
Detalhes CVE
Pontuacao CVSS v3.17.5
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado4/30/2026
Ultima modificacao4/30/2026
Fontenvd
Avistamentos honeypot0
Fraquezas (CWE)
CWE-22
Referencias
https://blog.csdn.net/qq_36618918/article/details/135104295(disclosure@vulncheck.com)
https://blog.csdn.net/xiayu729100940/article/details/135205082(disclosure@vulncheck.com)
https://www.cnvd.org.cn/flaw/show/CNVD-2022-43245(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/weaver-e-cology-unauthenticated-arbitrary-file-read-via-xmlrpcservlet(disclosure@vulncheck.com)
https://www.weaver.com.cn/cs/ecology_full_log.html(disclosure@vulncheck.com)
https://www.weaver.com.cn/cs/securityDownload.html#(disclosure@vulncheck.com)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.