CVE-2024-27516

9.8 CRITICAL

📋 TL;DR

This CVE describes a Server-Side Template Injection (SSTI) vulnerability in Live Helper Chat that allows remote attackers to execute arbitrary code and access sensitive information via the search parameter. Attackers can achieve remote code execution with high privileges. All users running affected versions of Live Helper Chat are vulnerable.

💻 Affected Systems

Products:
  • Live Helper Chat
Versions: All versions before 4.34v
Operating Systems: All operating systems running Live Helper Chat
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable file accessible are affected; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the server, data exfiltration, and lateral movement to other systems.

🟠

Likely Case

Remote code execution leading to data theft, installation of backdoors, or use of the server for further attacks.

🟢

If Mitigated

Attack blocked at perimeter with no successful exploitation; limited to attempted log entries.

🌐 Internet-Facing: HIGH - The vulnerability is exploitable via web interface and requires no authentication.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a publicly accessible endpoint with no authentication required; exploit code is available in public repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.34v and later

Vendor Advisory: https://github.com/LiveHelperChat/livehelperchat/commit/a61d231526a36d4a7d8cc957914799ee1f9db0ab

Restart Required: No

Instructions:

1. Download latest version from official repository. 2. Backup current installation. 3. Replace affected files with patched versions. 4. Verify functionality.

🔧 Temporary Workarounds

Block access to vulnerable endpoint

all

Temporarily block access to the vulnerable PHP file via web server configuration

# For Apache: add to .htaccess
<Files "faqweight.php">
    Order Allow,Deny
    Deny from all
</Files>
# For Nginx: add to server block
location ~ /lhc_web/modules/lhfaq/faqweight.php {
    deny all;
    return 403;
}

🧯 If You Can't Patch

  • Implement strict WAF rules to block SSTI payloads in search parameters
  • Restrict network access to Live Helper Chat interface to trusted IPs only

🔍 How to Verify

Check if Vulnerable:

Check if file exists at lhc_web/modules/lhfaq/faqweight.php and version is below 4.34v

Check Version:

grep -r "version" lhc_web/design/defaulttheme/version.txt 2>/dev/null || find . -name "*.php" -exec grep -l "LHC_VERSION" {} \; | head -1

Verify Fix Applied:

Verify version is 4.34v or higher and check that the search parameter validation has been implemented in faqweight.php

📡 Detection & Monitoring

Log Indicators:

  • Unusual search parameters containing template syntax like {{, }}, ${{, #, *{
  • Multiple requests to faqweight.php with encoded payloads
  • POST/GET requests to faqweight.php with suspicious search terms

Network Indicators:

  • HTTP requests to /lhc_web/modules/lhfaq/faqweight.php with template injection patterns
  • Outbound connections from Live Helper Chat server to unknown destinations

SIEM Query:

source="web_logs" AND (uri="/lhc_web/modules/lhfaq/faqweight.php" AND (query="*{{*" OR query="*}}*" OR query="*${{*"))

🔗 References

📤 Share & Export