CVE-2017-14198

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated users with design asset editing permissions in Squiz Matrix to execute arbitrary code remotely through a malicious time_format tag. It affects Squiz Matrix versions before 5.3.6.1 and 5.4.x before 5.4.1.3. Attackers can gain full control of affected systems if they have valid credentials and appropriate permissions.

💻 Affected Systems

Products:
  • Squiz Matrix CMS
Versions: Versions before 5.3.6.1 and 5.4.x before 5.4.1.3
Operating Systems: All platforms running Squiz Matrix
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with permissions to edit design assets. Default installations with default user roles may be vulnerable if users have design editing capabilities.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, steal data, install malware, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Authenticated attackers with design editing privileges gain remote code execution, potentially leading to data theft, website defacement, or lateral movement within the network.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the affected Squiz Matrix instance, though data within that system remains at risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials and design editing permissions. Public proof-of-concept demonstrates the vulnerability, making weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.3.6.1 or 5.4.1.3

Vendor Advisory: https://www.squiz.net/security-advisories

Restart Required: Yes

Instructions:

1. Backup your Squiz Matrix installation and database. 2. Download the patched version (5.3.6.1 for 5.3.x or 5.4.1.3 for 5.4.x). 3. Follow Squiz Matrix upgrade procedures. 4. Restart the application server. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Restrict Design Editing Permissions

all

Temporarily remove design asset editing permissions from non-essential users until patching can be completed.

Network Segmentation

all

Isolate Squiz Matrix servers from critical network segments and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls and review all user accounts with design editing permissions
  • Deploy web application firewall (WAF) rules to block suspicious time_format tag patterns

🔍 How to Verify

Check if Vulnerable:

Check Squiz Matrix version in admin interface or by examining version files in installation directory.

Check Version:

Check admin dashboard or examine /path/to/squiz/version.txt file

Verify Fix Applied:

Verify version is 5.3.6.1 or higher for 5.3.x branch, or 5.4.1.3 or higher for 5.4.x branch.

📡 Detection & Monitoring

Log Indicators:

  • Unusual time_format tag modifications in design assets
  • Suspicious PHP/system command execution in application logs
  • Multiple failed authentication attempts followed by successful login and design edits

Network Indicators:

  • Unexpected outbound connections from Squiz Matrix server
  • Traffic to known malicious IPs or domains

SIEM Query:

source="squiz-logs" AND ("time_format" OR "design_edit" OR "remote_code")

🔗 References

📤 Share & Export