CVE-2024-54449

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with document read/write privileges to write arbitrary files to any location on the LogicalDOC server's file system, potentially leading to remote code execution. The flaw exists in two API endpoints that handle document interactions. Organizations running vulnerable versions of LogicalDOC are affected.

💻 Affected Systems

Products:
  • LogicalDOC
Versions: Versions prior to 9.5.4
Operating Systems: All platforms running LogicalDOC
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with read/write privileges on at least one document

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the web server, allowing data theft, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Attackers upload malicious files to execute commands, potentially stealing sensitive documents, installing malware, or using the server for further attacks.

🟢

If Mitigated

With proper network segmentation and least privilege access, impact could be limited to the application server only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and knowledge of vulnerable endpoints

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.5.4

Vendor Advisory: https://www.logicaldoc.com/download-logicaldoc

Restart Required: No

Instructions:

1. Backup your LogicalDOC installation and database. 2. Download LogicalDOC 9.5.4 or later from the official website. 3. Follow the upgrade instructions in the documentation. 4. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Restrict API Access

all

Implement network-level restrictions to limit access to the vulnerable API endpoints

File System Permissions

all

Set strict file system permissions to prevent writing outside designated directories

🧯 If You Can't Patch

  • Implement strict access controls and limit document read/write privileges to essential users only
  • Deploy web application firewall rules to detect and block suspicious file write attempts

🔍 How to Verify

Check if Vulnerable:

Check LogicalDOC version in administration panel or by examining installation files

Check Version:

Check admin panel or examine logicaldoc/WEB-INF/classes/version.properties

Verify Fix Applied:

Verify version is 9.5.4 or later and test API endpoints for path traversal

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations via API
  • Multiple failed authentication attempts followed by successful API calls
  • Suspicious file paths in API requests

Network Indicators:

  • Unusual patterns in API requests to document endpoints
  • Requests attempting path traversal sequences

SIEM Query:

source="logicaldoc" AND (event="FILE_WRITE" OR api_endpoint="*/document/*") AND (path CONTAINS ".." OR path CONTAINS "/etc/" OR path CONTAINS "/root/")

🔗 References

📤 Share & Export