CVE-2024-25298

7.2 HIGH

📋 TL;DR

CVE-2024-25298 is a critical code injection vulnerability in REDAXO CMS version 5.15.1 that allows attackers to execute arbitrary code on affected systems. The vulnerability exists in modules.modules.php and can lead to complete system compromise. All REDAXO 5.15.1 installations are affected.

💻 Affected Systems

Products:
  • REDAXO CMS
Versions: 5.15.1
Operating Systems: All operating systems running REDAXO
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of REDAXO 5.15.1 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with attacker gaining full control over the web server, accessing sensitive data, and using the system as a foothold for lateral movement.

🟠

Likely Case

Remote code execution leading to website defacement, data theft, and installation of backdoors or malware.

🟢

If Mitigated

Limited impact if proper network segmentation and web application firewalls are in place, though code execution may still occur.

🌐 Internet-Facing: HIGH - Web applications are directly accessible from the internet, making them prime targets for automated exploitation.
🏢 Internal Only: MEDIUM - Internal systems could be exploited by authenticated users or through other compromised systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept exists in GitHub repositories, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.15.2 or later

Vendor Advisory: https://github.com/redaxo/redaxo/releases

Restart Required: No

Instructions:

1. Backup your REDAXO installation and database. 2. Update to REDAXO version 5.15.2 or later via the built-in update function or manual download. 3. Verify the update was successful by checking the version in the backend.

🔧 Temporary Workarounds

Disable vulnerable module

linux

Temporarily disable or remove the vulnerable modules.modules.php file if immediate patching is not possible

mv /path/to/redaxo/modules/modules.php /path/to/redaxo/modules/modules.php.disabled

Web Application Firewall rule

all

Implement WAF rules to block requests targeting the vulnerable endpoint

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable system
  • Deploy a web application firewall with rules specifically targeting this vulnerability

🔍 How to Verify

Check if Vulnerable:

Check if REDAXO version is exactly 5.15.1 by looking at the version in the admin panel or checking the redaxo/src/core/version.php file

Check Version:

grep -i 'version' /path/to/redaxo/src/core/version.php

Verify Fix Applied:

Verify the version has been updated to 5.15.2 or later in the admin panel or version.php file

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to modules.modules.php
  • Suspicious file uploads or system command execution in web logs
  • Unexpected process execution from web server user

Network Indicators:

  • HTTP requests containing suspicious payloads targeting modules endpoint
  • Outbound connections from web server to unknown IPs

SIEM Query:

source="web_logs" AND (uri="*modules.modules.php*" AND (method="POST" OR method="PUT")) AND (payload="*system(*" OR payload="*exec(*" OR payload="*shell_exec(*")

🔗 References

📤 Share & Export