CVE-2014-8945

9.8 CRITICAL

📋 TL;DR

This CVE describes a command injection vulnerability in Lexiglot's admin.php page that allows attackers to execute arbitrary commands on the server. The vulnerability affects all Lexiglot installations through version 2014-11-20 and can be exploited via username and password fields without authentication.

💻 Affected Systems

Products:
  • Lexiglot
Versions: through 2014-11-20
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the admin.php?page=projects endpoint specifically

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attackers to execute arbitrary commands with web server privileges, potentially leading to data theft, system takeover, or lateral movement.

🟠

Likely Case

Remote code execution leading to web server compromise, data exfiltration, or installation of backdoors.

🟢

If Mitigated

Limited impact if proper input validation and command sanitization are implemented, restricting attackers to limited command execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward via HTTP requests to the vulnerable endpoint

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2014-11-20

Vendor Advisory: https://www.justanotherhacker.com/2018/05/jahx181_-_piwigo_lexiglot_multiple_vulnerabilities.html

Restart Required: No

Instructions:

1. Upgrade Lexiglot to version after 2014-11-20
2. Replace vulnerable admin.php file with patched version
3. Verify no custom modifications are overwritten

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation to sanitize username and password fields

Modify admin.php to escape shell metacharacters in user inputs

Access Restriction

all

Restrict access to admin.php endpoint

Add IP whitelisting or authentication requirements to admin.php

🧯 If You Can't Patch

  • Implement WAF rules to block command injection patterns in username/password fields
  • Isolate the Lexiglot instance in a restricted network segment

🔍 How to Verify

Check if Vulnerable:

Check if Lexiglot version is 2014-11-20 or earlier, or test admin.php?page=projects endpoint for command injection

Check Version:

Check Lexiglot configuration files or database for version information

Verify Fix Applied:

Verify Lexiglot version is after 2014-11-20 and test that command injection attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual commands in web server logs
  • Multiple failed login attempts with shell metacharacters
  • Suspicious POST requests to admin.php

Network Indicators:

  • HTTP requests containing shell commands in parameters
  • Outbound connections from web server to unexpected destinations

SIEM Query:

source="web_logs" AND uri="*admin.php*" AND (param="*|*" OR param="*;*" OR param="*`*" OR param="*$(*")

🔗 References

📤 Share & Export