CVE-2025-63951

7.5 HIGH

📋 TL;DR

This CVE describes an insecure deserialization vulnerability in the MiczFlor RPi-Jukebox-RFID project's rss-mp3.php script. Remote unauthenticated attackers can inject arbitrary PHP objects via the 'rss' GET parameter, potentially causing denial of service or other impacts. Anyone using affected versions of this software is vulnerable.

💻 Affected Systems

Products:
  • MiczFlor RPi-Jukebox-RFID
Versions: All versions through commit 4b2334f0ae0e87c0568876fc41c48c38aa9a7014 (2025-10-07)
Operating Systems: Linux (Raspberry Pi OS)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component of the RFID-based jukebox system

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, though this depends on available PHP classes and configuration

🟠

Likely Case

Denial of service through PHP errors or crashes, potentially disrupting the jukebox functionality

🟢

If Mitigated

No impact if proper input validation and deserialization controls are implemented

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted serialized data to the vulnerable endpoint

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit after 4b2334f0ae0e87c0568876fc41c48c38aa9a7014

Vendor Advisory: https://github.com/solonbarroso/vulnerability-research/blob/main/advisories/RPi-Jukebox-RFID/CVE-2025-63951.md

Restart Required: No

Instructions:

1. Update to latest version from GitHub repository
2. Replace rss-mp3.php with patched version
3. Verify the fix implements proper input validation

🔧 Temporary Workarounds

Disable RSS-MP3 functionality

linux

Remove or disable access to the vulnerable rss-mp3.php script

sudo mv /path/to/rss-mp3.php /path/to/rss-mp3.php.disabled

Web server access control

linux

Restrict access to the script using web server configuration

# Add to Apache .htaccess:
<Files "rss-mp3.php">
    Order deny,allow
    Deny from all
</Files>

🧯 If You Can't Patch

  • Implement network segmentation to isolate the vulnerable system
  • Deploy a web application firewall (WAF) with deserialization attack detection

🔍 How to Verify

Check if Vulnerable:

Check if rss-mp3.php exists and contains unserialize() calls without validation

Check Version:

git log --oneline -1

Verify Fix Applied:

Verify the patched version validates input before deserialization

📡 Detection & Monitoring

Log Indicators:

  • PHP unserialize errors
  • Unusual POST/GET requests to rss-mp3.php

Network Indicators:

  • HTTP requests with serialized data in 'rss' parameter

SIEM Query:

source="web_logs" AND uri="*rss-mp3.php*" AND (param="rss" OR data CONTAINS "O:")

🔗 References

📤 Share & Export