Incorrect Regular Expression in .htaccess File Can Allow Code Execution
CVE-2022-25769
7.2HIGH
Key Information:
- Vendor
- Mautic
- Status
- Mautic
- Vendor
- CVE Published:
- 18 September 2024
Summary
The vulnerability arises from an issue with the default configuration of the .htaccess file in Mautic. The file is designed to restrict access to certain PHP files; however, the implemented logic is flawed. Specifically, the regex pattern in the FilesMatch
directive only validates the filename and does not account for the full path to the PHP files. This oversight can lead to unintended access to restricted PHP files, potentially compromising the integrity and confidentiality of the application.
Affected Version(s)
Mautic < 3.3.5 < 3.3.5
Mautic < 4.2.0 < 4.2.0
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Mattias Michaux
Mattias Michaux
John Linhart
Zdeno Kuzmany