CVE-2018-19510
📋 TL;DR
This vulnerability allows attackers to execute arbitrary SQL commands via the Client-IP HTTP header in Webgalamb's subscriber.php. It affects all Webgalamb installations through version 7.0, potentially leading to data theft, modification, or complete system compromise.
💻 Affected Systems
- Webgalamb
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise leading to data exfiltration, privilege escalation, and potential remote code execution on the underlying server.
Likely Case
Unauthorized database access allowing data theft, manipulation of user data, or administrative account takeover.
If Mitigated
Limited impact with proper input validation, parameterized queries, and network segmentation in place.
🎯 Exploit Status
Exploitation requires only HTTP request manipulation with SQL injection payloads in the Client-IP header.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown - Webgalamb appears to be abandoned
Vendor Advisory: None available
Restart Required: No
Instructions:
No official patch exists. Consider migrating to alternative software or implementing workarounds.
🔧 Temporary Workarounds
Input Validation Filter
allAdd input validation to sanitize Client-IP header values before processing
Modify subscriber.php to validate Client-IP header using regex: /^[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}$/
Web Application Firewall Rule
allBlock or sanitize SQL injection patterns in HTTP headers
Add WAF rule: deny requests where Client-IP header contains SQL keywords like UNION, SELECT, INSERT, DELETE, DROP
🧯 If You Can't Patch
- Isolate Webgalamb instances behind a reverse proxy with strict input validation
- Implement network segmentation to restrict database access from Webgalamb servers
🔍 How to Verify
Check if Vulnerable:
Send HTTP request to subscriber.php with malicious SQL payload in Client-IP header and observe database errors or unexpected behavior
Check Version:
Check Webgalamb version in admin interface or configuration files
Verify Fix Applied:
Test with same SQL injection payloads and verify they are rejected or sanitized without affecting database
📡 Detection & Monitoring
Log Indicators:
- SQL syntax errors in application logs
- Unusual database queries from web server IP
- Multiple failed login attempts via subscriber.php
Network Indicators:
- HTTP requests with SQL keywords in Client-IP header
- Abnormal database traffic patterns from web server
SIEM Query:
source="webgalamb.log" AND ("SQL" OR "syntax" OR "union" OR "select")
🔗 References
- http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html
- http://seclists.org/fulldisclosure/2019/Jan/15
- http://packetstormsecurity.com/files/151017/Webgalamb-Information-Disclosure-XSS-CSRF-SQL-Injection.html
- http://seclists.org/fulldisclosure/2019/Jan/15