CVE-2015-5951

9.9 CRITICAL

📋 TL;DR

This vulnerability allows attackers to upload arbitrary PHP files to the web root directory of Thomson Reuters FATCA software, enabling remote code execution. It affects FATCA versions before 5.2, potentially allowing complete system compromise. Organizations using vulnerable versions are at risk of data theft, system takeover, and lateral movement.

💻 Affected Systems

Products:
  • Thomson Reuters FATCA
Versions: All versions before 5.2
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires web interface access; PHP execution must be enabled on the server.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data exfiltration, ransomware deployment, backdoor installation, and lateral movement across the network.

🟠

Likely Case

Webshell installation allowing persistent access, credential theft, and data manipulation.

🟢

If Mitigated

Limited impact with proper network segmentation, file integrity monitoring, and web application firewalls blocking malicious uploads.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated access; multiple public exploit scripts available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.2

Vendor Advisory: https://www.thomsonreuters.com

Restart Required: Yes

Instructions:

1. Download FATCA version 5.2 or later from Thomson Reuters. 2. Backup current configuration and data. 3. Install the updated version following vendor instructions. 4. Restart the application and verify functionality.

🔧 Temporary Workarounds

File Upload Restriction

all

Configure web server to block PHP file uploads via the specid parameter

# Apache: Add to .htaccess
<FilesMatch "\.php$">
    Deny from all
</FilesMatch>
# Nginx: Add to server block
location ~ \.php$ {
    deny all;
}

Web Application Firewall

all

Deploy WAF rules to block malicious file upload patterns

# ModSecurity rule
SecRule ARGS:specid "@rx \.php$" "id:1001,phase:2,deny,msg:'Block PHP upload via specid'"

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FATCA servers from critical assets
  • Deploy file integrity monitoring to detect unauthorized PHP file creation in web root

🔍 How to Verify

Check if Vulnerable:

Check if FATCA version is below 5.2 and test file upload functionality with PHP extension via specid parameter

Check Version:

Check application interface or configuration files for version information

Verify Fix Applied:

Verify version is 5.2 or higher and attempt to upload PHP file via specid parameter (should be blocked)

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads via specid parameter
  • PHP file creation in web root directory
  • POST requests to upload endpoints with PHP extensions

Network Indicators:

  • HTTP POST requests containing .php files in specid parameter
  • Unusual outbound connections from FATCA server

SIEM Query:

source="web_logs" AND (uri_path="*/upload*" OR uri_path="*/specid*") AND (file_extension="php" OR file_extension="phtml")

🔗 References

📤 Share & Export