Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2018-19422 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Subrion CMS 4.2.1 has a critical file upload flaw. The `/panel/uploads` directory lacks proper restrictions in `.htaccess`.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Misconfiguration of the `.htaccess` file. ❌ **Flaw**: It fails to block execution of `.pht` and `.phar` extensions.…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Subrion Team (Intelliants). πŸ“¦ **Product**: Subrion CMS. πŸ“… **Affected Version**: Specifically **4.2.1**. ⚠️ **Component**: The `/panel/uploads` directory is the attack vector.

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Privileges**: Remote attackers gain the ability to execute code with the web server's privileges. πŸ’Ύ **Data**: Can access, modify, or delete any data on the server.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Auth Required**: YES. The exploit requires valid credentials (`-l <user> -p <password>`). πŸ“Š **Threshold**: Medium.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’» **Public Exploit**: YES. Multiple PoCs exist on GitHub (e.g., `CVE-2018-19422-SubrionCMS-RCE`). 🌐 **Availability**: Scripts are available for Windows/Linux.…

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Scan for Subrion CMS version 4.2.1. πŸ“‚ **Verify**: Check if `/panel/uploads` exists and if `.htaccess` allows `.pht`/`.phar` execution.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: The vendor acknowledged the issue (GitHub Issue #801). πŸ“ **Mitigation**: Update `.htaccess` to explicitly deny execution of `.pht` and `.phar` files.…

Q9What if no patch? (Workaround)

🚧 **Workaround**: Manually edit the `.htaccess` file in `/panel/uploads`. βž• **Rule**: Add `RemoveHandler .pht .phar` or `SetHandler` directives to block these extensions.…

Q10Is it urgent? (Priority Suggestion)

⚑ **Priority**: HIGH. 🚨 **Urgency**: RCE vulnerabilities are critical. Even with auth, the ease of exploitation via public scripts makes this a top-priority fix.…