CVE-2019-15123
📋 TL;DR
This vulnerability allows authenticated users in Viki Vera 4.9.1.26180 to upload malicious .aspx files through the branding module's logo change functionality, leading to remote code execution. Attackers with valid credentials can execute arbitrary code on the web server. Organizations using the affected Viki Vera version are at risk.
💻 Affected Systems
- Viki Vera
📦 What is this software?
Vera by Vikisolutions
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with attacker gaining complete control over the web server, potentially leading to data theft, lateral movement, or ransomware deployment.
Likely Case
Authenticated attackers upload web shells to maintain persistent access, steal sensitive data, or use the server for further attacks.
If Mitigated
With proper file upload restrictions and authentication controls, impact is limited to unauthorized logo changes only.
🎯 Exploit Status
Exploitation requires valid user credentials. The vulnerability is well-documented with technical details available in public advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown specific version - check vendor for updates
Vendor Advisory: http://www.vikisolutions.com/products/Vera.html
Restart Required: Yes
Instructions:
1. Contact Viki Solutions for patch information. 2. Apply the latest security update. 3. Restart the Vera application services. 4. Verify the fix by testing logo upload functionality.
🔧 Temporary Workarounds
Restrict file upload extensions
windowsConfigure web server or application to block .aspx file uploads through the branding module
Implement file upload validation
allAdd server-side validation to check file types and content before allowing uploads
🧯 If You Can't Patch
- Restrict access to branding module to administrators only
- Implement web application firewall rules to block .aspx file uploads
🔍 How to Verify
Check if Vulnerable:
Check Vera version in application interface or configuration files. If version is 4.9.1.26180, system is vulnerable.
Check Version:
Check application settings or consult Vera documentation for version command
Verify Fix Applied:
Attempt to upload a test .aspx file through the branding module logo upload feature. Successful blocking indicates fix.
📡 Detection & Monitoring
Log Indicators:
- Unusual .aspx file uploads via branding module
- Multiple failed upload attempts
- Successful .aspx uploads from non-admin users
Network Indicators:
- HTTP POST requests to branding upload endpoints with .aspx files
- Unusual outbound connections from web server
SIEM Query:
source="vera_logs" AND (url_path="*branding*" AND file_extension=".aspx")
🔗 References
- http://www.vikisolutions.com/products/Vera.html
- https://www.gosecure.net/blog/2020/06/11/vera-vulnerable-to-authenticated-remote-code-execution-cve-2019-15123/
- http://www.vikisolutions.com/products/Vera.html
- https://www.gosecure.net/blog/2020/06/11/vera-vulnerable-to-authenticated-remote-code-execution-cve-2019-15123/