CVE-2026-2184

7.3 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in the Great Developers Certificate Generation System that allows remote attackers to execute arbitrary commands on the server. The vulnerability exists in the csv.php file's photo parameter handling. Anyone running this certificate generation system with the vulnerable code is affected.

💻 Affected Systems

Products:
  • Great Developers Certificate Generation System
Versions: All versions up to commit 97171bb0e5e22e52eacf4e4fa81773e5f3cffb73
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: The project uses rolling releases with no version information available. Repository has been inactive for years.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise allowing attacker to execute arbitrary commands, install malware, exfiltrate data, or pivot to other systems.

🟠

Likely Case

Remote code execution leading to data theft, system disruption, or installation of backdoors.

🟢

If Mitigated

Limited impact if proper input validation and command execution restrictions are in place.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Still exploitable by internal attackers or compromised internal systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Command injection vulnerabilities are typically easy to exploit. Public references exist but no confirmed weaponized exploits.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider removing or replacing the system entirely.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Add strict input validation for the photo parameter to prevent command injection

Edit /restructured/csv.php to validate and sanitize user input before passing to system commands

Disable Vulnerable Endpoint

linux

Temporarily disable or restrict access to the vulnerable csv.php file

mv /restructured/csv.php /restructured/csv.php.disabled
chmod 000 /restructured/csv.php

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable system
  • Deploy a web application firewall (WAF) with command injection rules

🔍 How to Verify

Check if Vulnerable:

Check if the system uses the vulnerable commit hash 97171bb0e5e22e52eacf4e4fa81773e5f3cffb73 or earlier

Check Version:

git log --oneline -1

Verify Fix Applied:

Test the csv.php endpoint with command injection payloads to ensure they're blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual system commands in web server logs
  • Multiple requests to csv.php with shell metacharacters

Network Indicators:

  • HTTP requests to csv.php containing shell commands or special characters

SIEM Query:

source="web_server" AND uri="*/csv.php*" AND (request CONTAINS "|" OR request CONTAINS ";" OR request CONTAINS "`" OR request CONTAINS "$")

🔗 References

📤 Share & Export