CVE-2018-19514

9.8 CRITICAL

📋 TL;DR

CVE-2018-19514 is an arbitrary code execution vulnerability in Webgalamb email marketing software. Attackers can bypass authentication to upload malicious CSV files that get executed via PHP eval(), allowing remote code execution. All Webgalamb installations through version 7.0 are affected.

💻 Affected Systems

Products:
  • Webgalamb
Versions: through 7.0
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations through version 7.0 are vulnerable. Requires PHP environment.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the server, installing backdoors, stealing data, and using the system as a pivot point for further attacks.

🟠

Likely Case

Attacker executes arbitrary PHP code to deface websites, steal sensitive data, or install cryptocurrency miners.

🟢

If Mitigated

With proper authentication controls and file upload restrictions, exploitation would be prevented or limited to authenticated users only.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable without authentication on internet-facing installations.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but require network access; risk depends on internal threat landscape.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires authentication bypass first, then CSV file upload. Public exploit code exists in disclosure references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 7.0 (specific version not specified in references)

Vendor Advisory: Not provided in references

Restart Required: No

Instructions:

1. Upgrade Webgalamb to version after 7.0. 2. Apply any available security patches from vendor. 3. Remove or disable vulnerable versions.

🔧 Temporary Workarounds

Disable CSV upload functionality

all

Remove or restrict access to CSV file upload features in subscriber.php

# Modify subscriber.php to remove eval() calls or restrict file uploads
# Add authentication checks before file processing

Implement strict file upload validation

all

Add server-side validation for uploaded CSV files

# Add file type validation in PHP
# Implement file content scanning before processing

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious file uploads and eval() exploitation attempts
  • Isolate Webgalamb installation in network segment with strict outbound traffic controls

🔍 How to Verify

Check if Vulnerable:

Check Webgalamb version in admin panel or configuration files. If version is 7.0 or earlier, system is vulnerable.

Check Version:

# Check version in Webgalamb admin interface or config files
# grep -r 'version' /path/to/webgalamb/installation/

Verify Fix Applied:

Verify Webgalamb version is updated beyond 7.0 and test that CSV uploads no longer trigger eval() execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CSV file uploads to subscriber.php
  • Multiple failed authentication attempts followed by successful admin access
  • PHP eval() calls with suspicious parameters

Network Indicators:

  • POST requests to subscriber.php with file uploads
  • Unusual outbound connections from Webgalamb server

SIEM Query:

source="webgalamb.log" AND ("subscriber.php" AND "upload") OR ("eval" AND "CSV")

🔗 References

📤 Share & Export