CVE-2023-46987
📋 TL;DR
SeaCMS v12.9 contains a remote code execution vulnerability in the /augap/adminip.php component that allows attackers to execute arbitrary code on affected servers. This affects all SeaCMS v12.9 installations with the vulnerable component accessible. Attackers can potentially take full control of the server.
💻 Affected Systems
- SeaCMS
📦 What is this software?
Seacms by Seacms
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise allowing data theft, malware deployment, lateral movement, and persistent backdoor installation.
Likely Case
Website defacement, data exfiltration, cryptocurrency mining, or ransomware deployment.
If Mitigated
Limited impact if proper network segmentation, WAF rules, and least privilege access are implemented.
🎯 Exploit Status
Public technical analysis available with exploitation details. Simple HTTP requests can trigger the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: http://seacms.com
Restart Required: No
Instructions:
1. Check vendor website for updates. 2. If patch available, download and apply. 3. Verify fix by testing the vulnerable endpoint.
🔧 Temporary Workarounds
Block vulnerable endpoint
allRestrict access to /augap/adminip.php via web server configuration or firewall rules.
# Apache: RewriteRule ^/augap/adminip\.php$ - [F,L]
# Nginx: location ~ /augap/adminip\.php$ { deny all; }
Remove vulnerable file
linuxDelete or rename the vulnerable adminip.php file if not needed.
rm /path/to/seacms/augap/adminip.php
🧯 If You Can't Patch
- Implement strict network segmentation to isolate SeaCMS from critical systems
- Deploy web application firewall with RCE detection rules
🔍 How to Verify
Check if Vulnerable:
Check if /augap/adminip.php exists and is accessible via HTTP requests. Test with controlled payload if authorized.
Check Version:
Check SeaCMS version in admin panel or configuration files.
Verify Fix Applied:
Attempt to access /augap/adminip.php and verify it returns 403/404 or is blocked. Test with known exploit payloads in safe environment.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST/GET requests to /augap/adminip.php
- System command execution in web logs
- Unexpected process spawns from web server
Network Indicators:
- HTTP requests with suspicious parameters to adminip.php
- Outbound connections from web server to unknown IPs
SIEM Query:
source="web_logs" AND (uri="/augap/adminip.php" OR uri CONTAINS "adminip.php")