CVE-2023-53895
Improper Access Control in PimpMyLog 1.7.14 Enables Admin Account Creation
Publication date: 2025-12-16
Last updated on: 2025-12-16
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| pimpmylog | pimpmylog | 1.7.14 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-285 | The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in PimpMyLog 1.7.14 is an improper access control flaw that allows remote attackers to create administrative accounts without authorization by exploiting the configuration endpoint. Attackers can inject malicious JavaScript into the unsanitized username field, creating a hidden backdoor admin account. This injected script hides the malicious account from legitimate administrators and can potentially allow attackers to access sensitive server-side log information and environment variables. [3]
How can this vulnerability impact me? :
The impact of this vulnerability includes unauthorized creation of admin accounts, which grants attackers full administrative access to the PimpMyLog application. This can lead to unauthorized access to sensitive server logs (such as Apache, IIS, NGINX, PHP logs) and environment variables that may contain confidential data like passwords and API keys. The hidden backdoor account can evade detection by legitimate administrators, increasing the risk of persistent unauthorized access and data exposure. [3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for unauthorized POST requests to the /inc/configure.php endpoint that attempt to create new admin accounts. Specifically, look for POST requests containing parameters that create users with admin privileges and include suspicious or encoded JavaScript payloads in the username field. Network intrusion detection systems (NIDS) or web application firewalls (WAF) can be configured to alert on such patterns. Additionally, reviewing server logs for unexpected admin account creations or unusual JavaScript injections in usernames can help detect exploitation attempts. Example commands include using curl to test the endpoint or grep to search logs for suspicious entries. For instance, to check logs for suspicious usernames: `grep -i 'admin' /path/to/pimpmylog/logs/* | grep -E '<script|base64'` or to simulate the exploit attempt: `curl -X POST -d 'username=malicious_payload&other_params=values' https://yourserver/inc/configure.php`. [3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting access to the /inc/configure.php endpoint to trusted administrators only, such as by implementing IP whitelisting or authentication controls at the web server or firewall level. Disable or restrict the account creation functionality if possible. Apply input validation and sanitization on the username field to prevent JavaScript injection. If a patch or updated version of PimpMyLog is available that addresses this vulnerability, apply it promptly. Additionally, review existing admin accounts for unauthorized additions and remove any suspicious accounts. Monitor logs for further exploitation attempts and consider temporarily disabling the PimpMyLog service until the vulnerability is mitigated. [3]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthorized remote attackers to create hidden admin accounts and potentially access sensitive server-side log information and environment variables, which may include confidential data such as passwords and API keys. This unauthorized access and potential data exposure could lead to non-compliance with common standards and regulations like GDPR and HIPAA that require protection of sensitive information and proper access controls. However, specific impacts on compliance are not detailed in the provided resources. [3]