Vulnerability Details : CVE-2022-24734
Public exploit exists!
MyBB is a free and open source forum software. In affected versions the Admin CP's Settings management module does not validate setting types correctly on insertion and update, making it possible to add settings of supported type `php` with PHP code, executed on on _Change Settings_ pages. This results in a Remote Code Execution (RCE) vulnerability. The vulnerable module requires Admin CP access with the `Can manage settings?` permission. MyBB's Settings module, which allows administrators to add, edit, and delete non-default settings, stores setting data in an options code string ($options_code; mybb_settings.optionscode database column) that identifies the setting type and its options, separated by a new line character (\n). In MyBB 1.2.0, support for setting type php was added, for which the remaining part of the options code is PHP code executed on Change Settings pages (reserved for plugins and internal use). MyBB 1.8.30 resolves this issue. There are no known workarounds.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2022-24734
25.72%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2022-24734
-
MyBB Admin Control Code Injection RCE
Disclosure Date: 2022-03-09First seen: 2022-12-23exploit/multi/http/mybb_rce_cve_2022_24734This exploit module leverages an improper input validation vulnerability in MyBB prior to `1.8.30` to execute arbitrary code in the context of the user running the application. MyBB Admin Control setting page calls PHP `eval` function with an unsan
CVSS scores for CVE-2022-24734
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2022-24734
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by:
- nvd@nist.gov (Secondary)
- security-advisories@github.com (Primary)
References for CVE-2022-24734
-
https://github.com/mybb/mybb/commit/92012b9831b330714b9f9b4646a98784113489c1
Fix ACP Settings management RCE · mybb/mybb@92012b9 · GitHubPatch;Third Party Advisory
-
https://mybb.com/versions/1.8.30/
Version 1.8.30 - MyBBRelease Notes;Vendor Advisory
-
http://packetstormsecurity.com/files/167082/MyBB-1.8.29-Remote-Code-Execution.html
MyBB 1.8.29 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
https://github.com/mybb/mybb/security/advisories/GHSA-876v-gwgh-w57f
ACP Settings management RCE · Advisory · mybb/mybb · GitHubPatch;Third Party Advisory
-
http://packetstormsecurity.com/files/167333/MyBB-Admin-Control-Remote-Code-Execution.html
MyBB Admin Control Remote Code Execution ≈ Packet StormExploit;Third Party Advisory
-
https://www.zerodayinitiative.com/advisories/ZDI-22-503/
ZDI-22-503 | Zero Day InitiativeThird Party Advisory;VDB Entry;Vendor Advisory
Products affected by CVE-2022-24734
- cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*