WARNING: REMOTE CODE INCLUSION VULNERABILITY IN MULTIPLE VERSIONS OF PMB LIBRARY SOFTWARE, PATCH IMMEDIATELY!
CVE-2024-26289:CVSS 10 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Sources
Risks
A security issue in PMB library software by sigb.net has been identified, and patches have been made available. If successfully exploited, this vulnerability could lead to a compromise of the server running the PMB software, including remote code execution (RCE).
The impact of CVE-2024-26289 on Confidentiality, Integrity and Availability is High.
Description
PMB Library Software is a comprehensive library management system designed to streamline cataloguing, circulation, and patron management processes for libraries of all sizes. With its user-friendly interface and robust features, PMB offers librarians powerful tools for efficiently organizing collections and providing seamless access to resources.
Default installations of PMB harbour a vulnerability susceptible to malicious code execution, posing a significant threat to the confidentiality, availability, and integrity of the application.
Exploiting this vulnerability allows an attacker to implant a persistent backdoor with a single carefully crafted request, serving as a foothold for broader malicious exploits and compromising the system's security.
Recommended Actions
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://cert.be/en/report-incident
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.