CVE-2019-13187

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to upload arbitrary files to Symphony CMS servers running the vulnerable Rich Text Formatter (Redactor) extension. Attackers can upload malicious files like webshells to gain remote code execution. All Symphony CMS installations using Redactor extension v1.1.1 or earlier are affected.

💻 Affected Systems

Products:
  • Symphony CMS Rich Text Formatter (Redactor) extension
Versions: v1.1.1 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Symphony CMS with Redactor extension installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise via remote code execution, data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Webshell deployment leading to website defacement, data exfiltration, or use as part of a botnet.

🟢

If Mitigated

File upload attempts blocked or logged, with no successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST requests to vulnerable endpoints with malicious files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://symphonyextensions.com/extensions/richtext_redactor/

Restart Required: No

Instructions:

1. Remove or disable the Redactor extension. 2. Delete all uploaded files from the extension's upload directories. 3. Consider alternative rich text editor extensions.

🔧 Temporary Workarounds

Block vulnerable endpoints

all

Use web server configuration to block access to content.fileupload.php and content.imageupload.php

# Apache: RewriteRule ^(.*)/content\.(file|image)upload\.php$ - [F]
# Nginx: location ~ /\.php$ { if ($request_uri ~* /content\.(file|image)upload\.php) { return 403; } }

Restrict file upload permissions

linux

Set strict file permissions on upload directories to prevent execution

chmod 644 /path/to/upload/directory/*
chmod 755 /path/to/upload/directory/

🧯 If You Can't Patch

  • Disable the Redactor extension immediately
  • Implement WAF rules to block file uploads to vulnerable endpoints

🔍 How to Verify

Check if Vulnerable:

Check if Redactor extension is installed and version is ≤1.1.1 via Symphony CMS extensions panel.

Check Version:

Check Symphony CMS admin panel → System → Extensions

Verify Fix Applied:

Confirm extension is removed/disabled and test file upload functionality is blocked.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /content.fileupload.php or /content.imageupload.php
  • Uploads of executable file types (.php, .jsp, .asp)

Network Indicators:

  • Unusual outbound connections from web server
  • Large file uploads to vulnerable endpoints

SIEM Query:

source="web_server" AND (url="*content.fileupload.php*" OR url="*content.imageupload.php*") AND method="POST"

🔗 References

📤 Share & Export