CVE-2023-30145

9.8 CRITICAL

📋 TL;DR

Camaleon CMS v2.7.0 contains a Server-Side Template Injection vulnerability in the formats parameter that allows attackers to execute arbitrary code on the server. This affects all installations using the vulnerable version. Attackers can potentially take full control of affected systems.

💻 Affected Systems

Products:
  • Camaleon CMS
Versions: 2.7.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 2.7.0 are vulnerable by default. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, ransomware deployment, or use as a foothold for lateral movement.

🟠

Likely Case

Remote code execution allowing file system access, credential harvesting, and backdoor installation.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, though template injection could still leak sensitive information.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public proof-of-concept exploits exist. The vulnerability requires no authentication and has simple exploitation steps.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

Upgrade to a patched version if available, or apply workarounds. Check the official Camaleon CMS repository for updates.

🔧 Temporary Workarounds

Input Validation for formats Parameter

all

Implement strict input validation to only allow expected format values

Modify application code to validate formats parameter against whitelist

WAF Rule Implementation

all

Deploy web application firewall rules to block SSTI payloads

Add WAF rules to detect and block template injection patterns

🧯 If You Can't Patch

  • Isolate affected systems from internet access
  • Implement strict network segmentation and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Test the formats parameter with SSTI payloads like {{7*7}} and check if 49 appears in response

Check Version:

Check Camaleon CMS version in admin panel or configuration files

Verify Fix Applied:

Retest with SSTI payloads after applying fixes to ensure they are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to formats parameter
  • Template syntax in request logs
  • System command execution in application logs

Network Indicators:

  • HTTP requests containing template injection payloads
  • Unusual outbound connections from web server

SIEM Query:

source="web_logs" AND (request_uri="*formats*" AND (request_body="*{{*" OR request_body="*}}*"))

🔗 References

📤 Share & Export