CVE-2024-54135

9.8 CRITICAL

📋 TL;DR

This CVE describes a PHP deserialization vulnerability in ClipBucket V5 video hosting software that allows attackers to execute arbitrary code by sending malicious serialized objects. The vulnerability affects versions 2.0 through 5.5.1 Revision 199 and can be exploited without authentication. Any organization running vulnerable ClipBucket installations is at risk of complete system compromise.

💻 Affected Systems

Products:
  • ClipBucket V5
Versions: Version 2.0 to Version 5.5.1 Revision 199
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations within the affected version range are vulnerable. The vulnerability exists in photo upload functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, installation of backdoors, and lateral movement within the network.

🟠

Likely Case

Remote code execution allowing attackers to deface websites, steal sensitive data, or use the server for malicious activities like cryptocurrency mining or botnet participation.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and input validation are in place, though risk remains significant.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has publicly available proof-of-concept code. PHP deserialization attacks are well-documented with established gadget chains.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.5.1 Revision 200

Vendor Advisory: https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-4523-mqmv-wrqx

Restart Required: No

Instructions:

1. Backup your current installation and database. 2. Download the patched version from the official repository. 3. Replace vulnerable files with patched versions. 4. Verify the fix by checking that upload/photo_upload.php no longer passes unsanitized input to decode_key function.

🔧 Temporary Workarounds

Disable photo upload functionality

linux

Temporarily disable the vulnerable photo upload feature to prevent exploitation

mv upload/photo_upload.php upload/photo_upload.php.disabled

Web Application Firewall rule

all

Block requests containing PHP serialized objects in GET/POST parameters

🧯 If You Can't Patch

  • Implement strict input validation to reject any data containing PHP serialized objects
  • Deploy network segmentation to isolate the vulnerable system from critical assets

🔍 How to Verify

Check if Vulnerable:

Check if your ClipBucket version is between 2.0 and 5.5.1 Revision 199 by examining version files or database settings

Check Version:

grep -r 'version\|revision' includes/ config/ upload/ 2>/dev/null | grep -i '5\|2'

Verify Fix Applied:

Verify that upload/photo_upload.php no longer passes unsanitized user input to the decode_key function and that the application version shows 5.5.1 Revision 200 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to upload/photo_upload.php with serialized data in parameters
  • PHP errors related to unserialize() function
  • Unexpected file creations or process executions

Network Indicators:

  • HTTP requests containing serialized PHP objects (starting with O:, a:, s:) in GET/POST parameters
  • Traffic to upload/photo_upload.php with unusual parameter patterns

SIEM Query:

source="web_logs" AND uri="*photo_upload.php*" AND (param="*O:*" OR param="*a:*" OR param="*s:*")

🔗 References

📤 Share & Export