This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Subrion CMS 4.2.1 has a critical file upload flaw. The `/panel/uploads` directory lacks proper restrictions in `.htaccess`.β¦
π’ **Vendor**: Subrion Team (Intelliants). π¦ **Product**: Subrion CMS. π **Affected Version**: Specifically **4.2.1**. β οΈ **Component**: The `/panel/uploads` directory is the attack vector.
Q4What can hackers do? (Privileges/Data)
π **Privileges**: Remote attackers gain the ability to execute code with the web server's privileges. πΎ **Data**: Can access, modify, or delete any data on the server.β¦
π» **Public Exploit**: YES. Multiple PoCs exist on GitHub (e.g., `CVE-2018-19422-SubrionCMS-RCE`). π **Availability**: Scripts are available for Windows/Linux.β¦
π **Check**: Scan for Subrion CMS version 4.2.1. π **Verify**: Check if `/panel/uploads` exists and if `.htaccess` allows `.pht`/`.phar` execution.β¦
π§ **Workaround**: Manually edit the `.htaccess` file in `/panel/uploads`. β **Rule**: Add `RemoveHandler .pht .phar` or `SetHandler` directives to block these extensions.β¦
β‘ **Priority**: HIGH. π¨ **Urgency**: RCE vulnerabilities are critical. Even with auth, the ease of exploitation via public scripts makes this a top-priority fix.β¦