CVE-2018-16836
📋 TL;DR
CVE-2018-16836 is a directory traversal vulnerability in Rubedo CMS that allows unauthenticated attackers to read and execute arbitrary files outside the web root. This affects Rubedo CMS installations through version 3.4.0, potentially exposing sensitive system files like /etc/passwd.
💻 Affected Systems
- Rubedo CMS
📦 What is this software?
Rubedo by Rubedo Project
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise via reading sensitive configuration files, password files, or executing arbitrary code leading to full server takeover.
Likely Case
Information disclosure of sensitive files including configuration files, password hashes, and system information that could enable further attacks.
If Mitigated
Limited impact with proper file permissions and web server configuration preventing access to critical system files.
🎯 Exploit Status
Multiple public exploit scripts exist demonstrating file reading via path traversal in theme URLs. No authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.4.1 and later
Vendor Advisory: https://github.com/WebTales/rubedo/releases
Restart Required: Yes
Instructions:
1. Backup your Rubedo installation and database. 2. Download Rubedo version 3.4.1 or later from official repository. 3. Replace affected files, particularly theme component files. 4. Restart web server and application services.
🔧 Temporary Workarounds
Web Server Path Restriction
allConfigure web server to block directory traversal attempts in theme URLs
# For Apache: Add to .htaccess or virtual host config
RewriteEngine On
RewriteCond %{REQUEST_URI} \.\.\.* [OR]
RewriteCond %{REQUEST_URI} \.\./ [NC]
RewriteRule .* - [F,L]
Input Validation Filter
allAdd input validation to sanitize theme parameter inputs
# PHP example for input sanitization
$theme_path = str_replace(array('../', '..\\'), '', $_GET['theme']);
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block directory traversal patterns in URLs
- Restrict file system permissions to prevent web user from accessing sensitive directories
🔍 How to Verify
Check if Vulnerable:
Attempt to access /theme/default/img/../../../../etc/passwd on your Rubedo installation. If it returns the passwd file contents, the system is vulnerable.
Check Version:
Check Rubedo version in admin panel or examine composer.json for version information
Verify Fix Applied:
After patching, attempt the same directory traversal request. It should return a 403/404 error or empty response instead of file contents.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing '..' or '%2e%2e' in theme-related URLs
- Multiple 403/404 errors from same IP attempting directory traversal
Network Indicators:
- Unusual GET requests to theme paths with encoded directory traversal sequences
SIEM Query:
source="web_logs" AND (uri="*%2e%2e*" OR uri="*..*") AND uri="*/theme/*"