CVE-2020-37186

Chevereto · Chevereto Core

Chevereto 3.13.4 Core contains a remote code execution vulnerability where attackers can inject a PHP shell via the database table prefix parameter during installation.

Executive summary

An attacker can achieve remote code execution on Chevereto servers by manipulating database configuration parameters to install a malicious PHP shell file.

Vulnerability

This is a Remote Code Execution (RCE) vulnerability. During the database configuration phase, an attacker can manipulate the "table prefix" parameter in a POST request to write arbitrary PHP code into a shell file on the server.

Business impact

A successful exploit grants the attacker the ability to execute arbitrary system commands, leading to complete server takeover, data theft, and the ability to use the server as a pivot point for further internal network attacks. The CVSS score of 9.8 reflects the maximum threat level.

Remediation

Immediate Action: Update Chevereto to the latest secure version. If the installation process is currently active, ensure it is performed in a secured, non-public environment.

Proactive Monitoring: Scan the web root for any unauthorized .php files, particularly those created during or shortly after the installation timestamp.

Compensating Controls: Disable the installation script (typically the install directory) immediately after the initial setup is complete to prevent unauthorized access to configuration functions.

Exploitation status

Public Exploit Available: No

Analyst recommendation

Remote Code Execution is the most severe class of vulnerability. IT teams must ensure that no Chevereto instances are running version 3.13.4 and that all installation directories are removed or restricted to prevent unauthenticated attackers from re-triggering the configuration process.