CVE-2024-25298
📋 TL;DR
CVE-2024-25298 is a critical code injection vulnerability in REDAXO CMS version 5.15.1 that allows attackers to execute arbitrary code on affected systems. The vulnerability exists in modules.modules.php and can lead to complete system compromise. All REDAXO 5.15.1 installations are affected.
💻 Affected Systems
- REDAXO CMS
📦 What is this software?
Redaxo by Redaxo
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover with attacker gaining full control over the web server, accessing sensitive data, and using the system as a foothold for lateral movement.
Likely Case
Remote code execution leading to website defacement, data theft, and installation of backdoors or malware.
If Mitigated
Limited impact if proper network segmentation and web application firewalls are in place, though code execution may still occur.
🎯 Exploit Status
Public proof-of-concept exists in GitHub repositories, making exploitation straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.15.2 or later
Vendor Advisory: https://github.com/redaxo/redaxo/releases
Restart Required: No
Instructions:
1. Backup your REDAXO installation and database. 2. Update to REDAXO version 5.15.2 or later via the built-in update function or manual download. 3. Verify the update was successful by checking the version in the backend.
🔧 Temporary Workarounds
Disable vulnerable module
linuxTemporarily disable or remove the vulnerable modules.modules.php file if immediate patching is not possible
mv /path/to/redaxo/modules/modules.php /path/to/redaxo/modules/modules.php.disabled
Web Application Firewall rule
allImplement WAF rules to block requests targeting the vulnerable endpoint
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the vulnerable system
- Deploy a web application firewall with rules specifically targeting this vulnerability
🔍 How to Verify
Check if Vulnerable:
Check if REDAXO version is exactly 5.15.1 by looking at the version in the admin panel or checking the redaxo/src/core/version.php file
Check Version:
grep -i 'version' /path/to/redaxo/src/core/version.php
Verify Fix Applied:
Verify the version has been updated to 5.15.2 or later in the admin panel or version.php file
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to modules.modules.php
- Suspicious file uploads or system command execution in web logs
- Unexpected process execution from web server user
Network Indicators:
- HTTP requests containing suspicious payloads targeting modules endpoint
- Outbound connections from web server to unknown IPs
SIEM Query:
source="web_logs" AND (uri="*modules.modules.php*" AND (method="POST" OR method="PUT")) AND (payload="*system(*" OR payload="*exec(*" OR payload="*shell_exec(*")