CVE-2019-25257
Unknown Unknown - Not Provided
Authenticated OS Command Injection in LogicalDOC 7.7.4 System Settings

Publication date: 2025-12-24

Last updated on: 2025-12-24

Assigner: VulnCheck

Description
LogicalDOC Enterprise 7.7.4 contains multiple authenticated OS command execution vulnerabilities that allow attackers to manipulate binary paths when changing system settings. Attackers can exploit these vulnerabilities by modifying configuration parameters like antivirus.command, ocr.Tesseract.path, and other system paths to execute arbitrary system commands with elevated privileges.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-24
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
logicaldoc enterprise 7.7.4
apache tomcat 8.5.24
apache tomcat 8.5.13
java java 1.8.0_161
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-426 The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not explicitly discuss the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA. However, given that the vulnerability allows authenticated attackers to execute arbitrary system commands with elevated privileges, potentially leading to full system compromise, it could result in unauthorized access to sensitive data managed by LogicalDOC. This unauthorized access and potential data breach could negatively affect compliance with data protection regulations that require safeguarding sensitive information. Still, no direct statements about compliance impact are available in the provided text. [1, 3]


Can you explain this vulnerability to me?

CVE-2019-25257 is a vulnerability in LogicalDOC Enterprise (version 7.7.4 and earlier) where authenticated users can manipulate binary path settings within the application, such as antivirus.command and ocr.Tesseract.path. By changing these paths to malicious commands, attackers can execute arbitrary operating system commands with elevated privileges (root or SYSTEM). This occurs because the application improperly handles these binary paths when changing system settings, allowing command injection and execution upon certain operations like file uploads. [1, 3]


How can this vulnerability impact me? :

This vulnerability can lead to severe impacts including local privilege escalation and full system compromise. An attacker with authenticated access can execute arbitrary system commands with elevated privileges, potentially gaining root or SYSTEM level control over the affected system. This can allow unauthorized access to sensitive data, execution of malicious payloads, and complete takeover of the server running LogicalDOC Enterprise. [1, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the binary path configuration parameters such as antivirus.command, ocr.Tesseract.path, command.openssl, command.convert, command.gs, command.pdftohtml, and command.keytool have been manipulated to include malicious commands. Detection involves inspecting the LogicalDOC settings, especially the /frontend/setting and /frontend/sign endpoints, for unauthorized changes. Commands to detect suspicious configurations could include querying these settings via authenticated access or monitoring for unusual command executions triggered by file uploads. For example, on the system, you could check the current values of these parameters in the LogicalDOC configuration files or database. Additionally, monitoring for unexpected processes like calc.exe running with elevated privileges on Windows or reverse shell commands on Linux could indicate exploitation. Specific commands depend on the environment but might include: - On Linux: `ps aux | grep tesseract` or `grep -r 'command' /path/to/logicaldoc/config` - On Windows: checking running processes for unexpected binaries launched by LogicalDOC. However, no explicit detection commands are provided in the resources. [1, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting authenticated access to the LogicalDOC web frontend, especially the settings endpoints (/frontend/setting and /frontend/sign), to trusted administrators only. Review and validate all binary path configuration parameters to ensure they have not been tampered with. Avoid running LogicalDOC with elevated privileges if possible. Applying patches or upgrading to a version of LogicalDOC that addresses these vulnerabilities is recommended once available. Additionally, monitor for suspicious activity such as unexpected command executions triggered by file uploads. If possible, disable or restrict features that allow changing binary paths until a fix is applied. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart