CVE-2021-27964
📋 TL;DR
CVE-2021-27964 allows unauthenticated attackers to upload arbitrary files to SonLogger web servers via a specific endpoint. This can lead to remote code execution by uploading malicious files like web shells. All SonLogger installations before version 6.4.1 are affected.
💻 Affected Systems
- SonLogger
📦 What is this software?
Sonlogger by Sfcyazilim
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through remote code execution, data theft, lateral movement, and persistent backdoor installation.
Likely Case
Web shell upload leading to server control, data exfiltration, and potential ransomware deployment.
If Mitigated
Attack blocked at network perimeter or detected before exploitation; no impact.
🎯 Exploit Status
Simple HTTP POST request with file upload to vulnerable endpoint; multiple public exploit scripts available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.4.1
Vendor Advisory: https://www.sonlogger.com/releasenotes
Restart Required: Yes
Instructions:
1. Download SonLogger 6.4.1 or later from official vendor site. 2. Backup configuration and data. 3. Stop SonLogger service. 4. Install updated version. 5. Restart service. 6. Verify functionality.
🔧 Temporary Workarounds
Block Vulnerable Endpoint
allUse web application firewall or reverse proxy to block POST requests to /Config/SaveUploadedHotspotLogoFile
# Example nginx location block
location /Config/SaveUploadedHotspotLogoFile { deny all; }
# Example Apache
<Location "/Config/SaveUploadedHotspotLogoFile">
Require all denied
</Location>
Network Segmentation
allRestrict access to SonLogger management interface to trusted IPs only
# Example iptables rule
iptables -A INPUT -p tcp --dport [SonLogger_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [SonLogger_PORT] -j DROP
# Windows Firewall
New-NetFirewallRule -DisplayName "Block SonLogger External" -Direction Inbound -Protocol TCP -LocalPort [SonLogger_PORT] -RemoteAddress "NotLocalSubnet" -Action Block
🧯 If You Can't Patch
- Implement strict network access controls to limit SonLogger exposure to only necessary users/systems.
- Deploy web application firewall with file upload filtering and malicious content detection.
🔍 How to Verify
Check if Vulnerable:
Check SonLogger version via web interface or configuration files; versions below 6.4.1 are vulnerable. Test by attempting POST request to /Config/SaveUploadedHotspotLogoFile with a test file.
Check Version:
# Windows: Check installed programs or SonLogger configuration files
# Linux: Check package manager or installation directory version files
Verify Fix Applied:
Verify version is 6.4.1 or higher. Attempt exploitation via POST request to vulnerable endpoint; should receive authentication error or 404.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /Config/SaveUploadedHotspotLogoFile
- File uploads with unusual extensions (.php, .asp, .jsp) to SonLogger directories
- Unauthenticated requests followed by command execution patterns
Network Indicators:
- Unusual outbound connections from SonLogger server
- POST requests to vulnerable endpoint from unexpected sources
- File uploads exceeding normal size patterns
SIEM Query:
source="sonlogger.log" AND (url="/Config/SaveUploadedHotspotLogoFile" OR (method="POST" AND file_extension IN ("php", "asp", "jsp", "ashx")))
🔗 References
- http://packetstormsecurity.com/files/161793/SonLogger-4.2.3.3-Shell-Upload.html
- https://github.com/erberkan/SonLogger-vulns
- https://www.sonlogger.com/releasenotes
- http://packetstormsecurity.com/files/161793/SonLogger-4.2.3.3-Shell-Upload.html
- https://github.com/erberkan/SonLogger-vulns
- https://www.sonlogger.com/releasenotes