CVE-2019-25257
Authenticated OS Command Injection in LogicalDOC 7.7.4 System Settings
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| logicaldoc | enterprise | 7.7.4 |
| apache | tomcat | 8.5.24 |
| apache | tomcat | 8.5.13 |
| java | java | 1.8.0_161 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-426 | The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided resources do not explicitly discuss the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA. However, given that the vulnerability allows authenticated attackers to execute arbitrary system commands with elevated privileges, potentially leading to full system compromise, it could result in unauthorized access to sensitive data managed by LogicalDOC. This unauthorized access and potential data breach could negatively affect compliance with data protection regulations that require safeguarding sensitive information. Still, no direct statements about compliance impact are available in the provided text. [1, 3]
Can you explain this vulnerability to me?
CVE-2019-25257 is a vulnerability in LogicalDOC Enterprise (version 7.7.4 and earlier) where authenticated users can manipulate binary path settings within the application, such as antivirus.command and ocr.Tesseract.path. By changing these paths to malicious commands, attackers can execute arbitrary operating system commands with elevated privileges (root or SYSTEM). This occurs because the application improperly handles these binary paths when changing system settings, allowing command injection and execution upon certain operations like file uploads. [1, 3]
How can this vulnerability impact me? :
This vulnerability can lead to severe impacts including local privilege escalation and full system compromise. An attacker with authenticated access can execute arbitrary system commands with elevated privileges, potentially gaining root or SYSTEM level control over the affected system. This can allow unauthorized access to sensitive data, execution of malicious payloads, and complete takeover of the server running LogicalDOC Enterprise. [1, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if the binary path configuration parameters such as antivirus.command, ocr.Tesseract.path, command.openssl, command.convert, command.gs, command.pdftohtml, and command.keytool have been manipulated to include malicious commands. Detection involves inspecting the LogicalDOC settings, especially the /frontend/setting and /frontend/sign endpoints, for unauthorized changes. Commands to detect suspicious configurations could include querying these settings via authenticated access or monitoring for unusual command executions triggered by file uploads. For example, on the system, you could check the current values of these parameters in the LogicalDOC configuration files or database. Additionally, monitoring for unexpected processes like calc.exe running with elevated privileges on Windows or reverse shell commands on Linux could indicate exploitation. Specific commands depend on the environment but might include: - On Linux: `ps aux | grep tesseract` or `grep -r 'command' /path/to/logicaldoc/config` - On Windows: checking running processes for unexpected binaries launched by LogicalDOC. However, no explicit detection commands are provided in the resources. [1, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting authenticated access to the LogicalDOC web frontend, especially the settings endpoints (/frontend/setting and /frontend/sign), to trusted administrators only. Review and validate all binary path configuration parameters to ensure they have not been tampered with. Avoid running LogicalDOC with elevated privileges if possible. Applying patches or upgrading to a version of LogicalDOC that addresses these vulnerabilities is recommended once available. Additionally, monitor for suspicious activity such as unexpected command executions triggered by file uploads. If possible, disable or restrict features that allow changing binary paths until a fix is applied. [1, 3]