CVE-2026-27636

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated users to upload .htaccess or .user.ini files to FreeScout help desk systems, enabling remote code execution on Apache servers with AllowOverride All configuration. It affects FreeScout installations prior to version 1.8.206. The vulnerability can be exploited alone or combined with CVE-2026-27637 for greater impact.

💻 Affected Systems

Products:
  • FreeScout
Versions: All versions prior to 1.8.206
Operating Systems: Linux with Apache
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Apache with AllowOverride All configuration, which is common but not universal.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing attacker to execute arbitrary code, access sensitive data, and pivot to other systems.

🟠

Likely Case

Unauthorized file upload leading to web shell deployment and limited server access.

🟢

If Mitigated

File upload blocked or restricted to safe extensions, preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.206

Vendor Advisory: https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-6gcm-v8xf-j9v9

Restart Required: No

Instructions:

1. Backup your FreeScout installation and database. 2. Download version 1.8.206 from the official repository. 3. Replace the existing installation with the patched version. 4. Verify the patch by checking the Helper.php file includes .htaccess and .user.ini in restricted extensions.

🔧 Temporary Workarounds

Restrict Apache AllowOverride

linux

Change Apache configuration to restrict .htaccess file processing

# In Apache configuration or .htaccess: AllowOverride None

Web Server File Upload Block

linux

Configure web server to block .htaccess and .user.ini uploads

# In Apache configuration: <FilesMatch "^\.(htaccess|user\.ini)$">
    Require all denied
</FilesMatch>

🧯 If You Can't Patch

  • Implement strict file upload validation at application level to block .htaccess and .user.ini files
  • Monitor file upload directories for suspicious .htaccess or .user.ini files and implement real-time alerting

🔍 How to Verify

Check if Vulnerable:

Check if FreeScout version is below 1.8.206 and review app/Misc/Helper.php for missing .htaccess/.user.ini in restricted extensions list.

Check Version:

php artisan --version

Verify Fix Applied:

Verify FreeScout version is 1.8.206 or higher and confirm .htaccess and .user.ini are in the restricted extensions array in Helper.php.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected .htaccess or .user.ini file uploads in application logs
  • Apache error logs showing unusual .htaccess processing

Network Indicators:

  • Unusual POST requests to file upload endpoints with .htaccess/.user.ini files

SIEM Query:

source="apache_access" AND (uri="/conversations/upload" OR uri="/attachments/upload") AND (user_agent="*.htaccess*" OR user_agent="*.user.ini*")

🔗 References

📤 Share & Export