CVE-2024-37295

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated administrators in Aimeos e-commerce framework to upload malicious files disguised as images that contain PHP code, which can then be executed on the web server. This affects Aimeos installations from version 2024.01.1 up to but not including 2024.04.5. Attackers with admin access could achieve remote code execution.

💻 Affected Systems

Products:
  • Aimeos Core
Versions: 2024.01.1 to 2024.04.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrative user privileges to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise leading to data theft, defacement, malware deployment, or lateral movement within the network.

🟠

Likely Case

Unauthorized code execution allowing data exfiltration, backdoor installation, or disruption of e-commerce operations.

🟢

If Mitigated

Limited impact if proper file upload validation and admin access controls are enforced, though risk remains elevated.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.04.5

Vendor Advisory: https://github.com/aimeos/aimeos-core/security/advisories/GHSA-rhc2-23c2-ww7c

Restart Required: No

Instructions:

1. Backup your Aimeos installation and database. 2. Update Aimeos to version 2024.04.5 or later via Composer: composer require aimeos/aimeos-core:2024.04.5. 3. Clear any cached files if applicable.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrative access to trusted users only and implement multi-factor authentication.

File Upload Restrictions

linux

Configure web server to block execution of uploaded files in upload directories.

For Apache: Add 'php_flag engine off' to .htaccess in upload directory
For Nginx: Add 'location ~ \.php$ { deny all; }' to upload directory config

🧯 If You Can't Patch

  • Immediately restrict administrative user accounts to absolute minimum required personnel.
  • Implement web application firewall rules to block suspicious file upload patterns.

🔍 How to Verify

Check if Vulnerable:

Check Aimeos version via Composer: composer show aimeos/aimeos-core | grep versions

Check Version:

composer show aimeos/aimeos-core | grep versions

Verify Fix Applied:

Confirm version is 2024.04.5 or higher using the same command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads by admin users
  • PHP file execution from upload directories
  • Web server error logs showing file validation failures

Network Indicators:

  • HTTP POST requests to file upload endpoints with unusual file extensions
  • Outbound connections from web server to unknown IPs

SIEM Query:

source="web_server_logs" AND (uri_path="/admin/upload" OR uri_path LIKE "%/upload%") AND (file_extension="php" OR content_type="image/*" AND file_size>typical_image_size)

🔗 References

📤 Share & Export