CVE-2014-5087
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary commands on servers running vulnerable versions of Sphider Search Engine. Attackers can achieve remote code execution (RCE) by exploiting improper input validation in admin functions. Any organization using Sphider Search Engine versions prior to 1.3.6 is affected.
💻 Affected Systems
- Sphider Search Engine
📦 What is this software?
Sphider by Sphider
Sphider Plus by Sphider Plus
Sphider Pro by Sphiderpro
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to execute arbitrary commands, install malware, exfiltrate data, or pivot to other systems.
Likely Case
Remote code execution leading to web server compromise, data theft, or website defacement.
If Mitigated
Limited impact if proper network segmentation, web application firewalls, and least privilege principles are implemented.
🎯 Exploit Status
Exploitation requires admin access or ability to access admin functions. Public exploit code exists in Packet Storm references.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.3.6 and later
Vendor Advisory: http://www.sphider.eu/
Restart Required: No
Instructions:
1. Download Sphider 1.3.6 or later from official site. 2. Backup current installation. 3. Replace all files with new version. 4. Verify admin/spiderfuncs.php has been updated.
🔧 Temporary Workarounds
Restrict admin access
allLimit access to admin functions via IP whitelisting or authentication hardening
# Add to .htaccess for Apache: Order deny,allow
Deny from all
Allow from 192.168.1.0/24
Remove vulnerable file
linuxTemporarily remove or rename the vulnerable admin/spiderfuncs.php file
mv admin/spiderfuncs.php admin/spiderfuncs.php.disabled
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Sphider instance
- Deploy web application firewall (WAF) with RCE protection rules
🔍 How to Verify
Check if Vulnerable:
Check if admin/spiderfuncs.php contains exec() calls without proper input validation
Check Version:
Check version.txt file or look for version information in Sphider configuration files
Verify Fix Applied:
Verify admin/spiderfuncs.php has been updated and exec() calls are properly sanitized
📡 Detection & Monitoring
Log Indicators:
- Unusual exec() calls in PHP logs
- Suspicious admin access patterns
- Unexpected system command execution
Network Indicators:
- Unusual outbound connections from web server
- Traffic to admin functions from unexpected sources
SIEM Query:
source="web_logs" AND ("exec(" OR "system(" OR "shell_exec(") AND uri="*/admin/spiderfuncs.php*"
🔗 References
- http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html
- https://vulmon.com/searchpage?page=2&q=Shayan+S
- http://packetstormsecurity.com/files/127720/Sphider-Search-Engine-Command-Execution-SQL-Injection.html
- https://vulmon.com/searchpage?page=2&q=Shayan+S