Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2022-29464

Description

Certain WSO2 products allow unrestricted file upload with resultant remote code execution. The attacker must use a /fileupload endpoint with a Content-Disposition directory traversal sequence to reach a directory under the web root, such as a ../../../../repository/deployment/server/webapps directory. This affects WSO2 API Manager 2.2.0 up to 4.0.0, WSO2 Identity Server 5.2.0 up to 5.11.0, WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0 and 5.6.0, WSO2 Identity Server as Key Manager 5.3.0 up to 5.11.0, WSO2 Enterprise Integrator 6.2.0 up to 6.6.0, WSO2 Open Banking AM 1.4.0 up to 2.0.0 and WSO2 Open Banking KM 1.4.0, up to 2.0.0.

POC

Reference

- http://packetstormsecurity.com/files/166921/WSO-Arbitrary-File-Upload-Remote-Code-Execution.html

- http://www.openwall.com/lists/oss-security/2022/04/22/7

- https://github.com/hakivvi/CVE-2022-29464

- https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1738/

Github

- https://github.com/000pp/WSOB

- https://github.com/0day404/vulnerability-poc

- https://github.com/0xAgun/CVE-2022-29464

- https://github.com/0xMarcio/cve

- https://github.com/20142995/Goby

- https://github.com/20142995/nuclei-templates

- https://github.com/20142995/pocsuite3

- https://github.com/2lambda123/panopticon-unattributed

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/Andromeda254/cve

- https://github.com/ArrestX/--POC

- https://github.com/Awrrays/FrameVul

- https://github.com/Blackyguy/-CVE-2022-29464

- https://github.com/Bryan988/shodan-wso2

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/Chocapikk/CVE-2022-29464

- https://github.com/GhostTroops/TOP

- https://github.com/H3xL00m/CVE-2022-29464

- https://github.com/Hatcat123/my_stars

- https://github.com/HimmelAward/Goby_POC

- https://github.com/Inplex-sys/CVE-2022-29464-loader

- https://github.com/JERRY123S/all-poc

- https://github.com/Jhonsonwannaa/CVE-2022-29464-

- https://github.com/KatherineHuangg/metasploit-POC

- https://github.com/KayCHENvip/vulnerability-poc

- https://github.com/Lidong-io/cve-2022-29464

- https://github.com/LinJacck/CVE-2022-29464

- https://github.com/Loginsoft-LLC/Linux-Exploit-Detection

- https://github.com/Loginsoft-Research/Linux-Exploit-Detection

- https://github.com/Miraitowa70/POC-Notes

- https://github.com/N3rdyN3xus/CVE-2022-29464

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/NyxAzrael/Goby_POC

- https://github.com/NyxByt3/CVE-2022-29464

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/Panopticon-Project/panopticon-unattributed

- https://github.com/Pari-Malam/CVE-2022-29464

- https://github.com/Pasch0/WSO2RCE

- https://github.com/Pushkarup/CVE-2022-29464

- https://github.com/PyterSmithDarkGhost/EXPLOITCVE-2022-29464

- https://github.com/SYRTI/POC_to_review

- https://github.com/SnailDev/github-hot-hub

- https://github.com/Sp3c73rSh4d0w/CVE-2022-29464

- https://github.com/Str1am/my-nuclei-templates

- https://github.com/SynixCyberCrimeMy/CVE-2022-29464

- https://github.com/SystemVll/CVE-2022-29464-loader

- https://github.com/ThatNotEasy/CVE-2022-29464

- https://github.com/Threekiii/Awesome-POC

- https://github.com/UUFR/CVE-2022-29464

- https://github.com/W01fh4cker/Serein

- https://github.com/WhooAmii/POC_to_review

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/Z0fhack/Goby_POC

- https://github.com/adriyansyah-mf/mass-auto-exploit-wso2

- https://github.com/amit-pathak009/CVE-2022-29464

- https://github.com/amit-pathak009/CVE-2022-29464-mass

- https://github.com/anquanscan/sec-tools

- https://github.com/awsassets/WSO2RCE

- https://github.com/axin2019/CVE-2022-29464

- https://github.com/badguy233/CVE-2022-29465

- https://github.com/c0d3cr4f73r/CVE-2022-29464

- https://github.com/c1ph3rbyt3/CVE-2022-29464

- https://github.com/cc3305/CVE-2022-29464

- https://github.com/cc8700619/poc

- https://github.com/cipher387/awesome-ip-search-engines

- https://github.com/crypticdante/CVE-2022-29464

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/devengpk/CVE-2022-29464

- https://github.com/dravenww/curated-article

- https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464

- https://github.com/electr0lulz/electr0lulz

- https://github.com/fardeen-ahmed/Bug-bounty-Writeups

- https://github.com/g0dxing/CVE-2022-29464

- https://github.com/gbrsh/CVE-2022-29464

- https://github.com/gpiechnik2/nmap-CVE-2022-29464

- https://github.com/h3v0x/CVE-2022-29464

- https://github.com/h3x0v3rl0rd/CVE-2022-29464

- https://github.com/hakivvi/CVE-2022-29464

- https://github.com/hev0x/CVE-2022-29464

- https://github.com/hktalent/TOP

- https://github.com/hupe1980/CVE-2022-29464

- https://github.com/hxlxmj/Mass-exploit-CVE-2022-29464

- https://github.com/insecrez/Bug-bounty-Writeups

- https://github.com/jbmihoub/all-poc

- https://github.com/jimidk/Better-CVE-2022-29464

- https://github.com/johdcyber/cloudflare-bypass-rules

- https://github.com/k0mi-tg/CVE-POC

- https://github.com/k4u5h41/CVE-2022-29464

- https://github.com/lit1numyt/docker-pentest_victim

- https://github.com/lonnyzhang423/github-hot-hub

- https://github.com/lowkey0808/cve-2022-29464

- https://github.com/manas3c/CVE-POC

- https://github.com/merlinepedra/AttackWebFrameworkTools-5.0

- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0

- https://github.com/mr-r3bot/WSO2-CVE-2022-29464

- https://github.com/n3rdh4x0r/CVE-2022-29464

- https://github.com/nguyenthanhvu240/Integration-Dejavu-Engine

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/oppsec/WSOB

- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main

- https://github.com/peiqiF4ck/WebFrameworkTools-5.5

- https://github.com/peiqiF4ck/WebFrameworkTools-5.5-enhance

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/r4x0r1337/-CVE-2022-29464

- https://github.com/require8/waf-log-clean-data-script

- https://github.com/rootxyash/learn365days

- https://github.com/shengshengli/AttackWebFrameworkTools-5.0

- https://github.com/superlink996/chunqiuyunjingbachang

- https://github.com/superzerosec/CVE-2022-29464

- https://github.com/superzerosec/poc-exploit-index

- https://github.com/tanjiti/sec_profile

- https://github.com/trganda/starrlist

- https://github.com/trhacknon/CVE-2022-29464

- https://github.com/trhacknon/CVE-2022-29464-mass

- https://github.com/trhacknon/Pocingit

- https://github.com/tufanturhan/wso2-rce-cve-2022-29464

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/whoforget/CVE-POC

- https://github.com/xiaoy-sec/Pentest_Note

- https://github.com/xinghonghaoyue/CVE-2022-29464

- https://github.com/youwizard/CVE-POC

- https://github.com/zecool/cve