CVE-2023-24734

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in PMB v7.4.6 allows attackers to upload malicious image files through the camera_upload.php component, leading to arbitrary code execution on the server. Any organization running the vulnerable version of PMB is affected, potentially giving attackers full control over the system.

💻 Affected Systems

Products:
  • PMB (PhpMyBibli)
Versions: v7.4.6 specifically
Operating Systems: Any OS running PHP (Linux, Windows, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation of PMB v7.4.6. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining root/admin privileges, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Web server compromise leading to defacement, data theft, and lateral movement within the network.

🟢

If Mitigated

Attack blocked at web application firewall level with no file upload reaching the vulnerable component.

🌐 Internet-Facing: HIGH - The camera_upload.php component is typically internet-accessible, making exploitation trivial for remote attackers.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this if the component is network-accessible.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and is straightforward - attackers simply need to craft a malicious image file and upload it to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v7.4.7 or later

Vendor Advisory: https://github.com/pmb-bib/pmb/releases

Restart Required: No

Instructions:

1. Backup your PMB installation and database. 2. Download the latest version from the official repository. 3. Replace the vulnerable files with patched versions. 4. Verify the camera_upload.php component has proper file validation.

🔧 Temporary Workarounds

Disable camera_upload.php

linux

Temporarily disable or remove the vulnerable component

mv /path/to/pmb/camera_upload.php /path/to/pmb/camera_upload.php.disabled

Implement WAF rules

all

Block malicious file uploads at the web application firewall

🧯 If You Can't Patch

  • Implement strict file upload validation in camera_upload.php to only accept verified image formats
  • Move PMB installation behind authentication and restrict access to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check if PMB version is 7.4.6 by examining the version file or admin interface

Check Version:

grep -r 'version' /path/to/pmb/installation/ | grep 7.4.6

Verify Fix Applied:

Verify the camera_upload.php file has proper file extension and content validation checks

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to camera_upload.php
  • Large number of failed upload attempts
  • Uploads with non-standard image extensions

Network Indicators:

  • POST requests to /camera_upload.php with executable file extensions
  • Unusual outbound connections from the PMB server

SIEM Query:

source="web_server" AND uri="/camera_upload.php" AND (file_extension="php" OR file_extension="exe" OR file_extension="sh")

🔗 References

📤 Share & Export