CVE-2025-34300 Scanner

CVE-2025-34300 Scanner - Remote Code Execution vulnerability in SawtoothSoftware Lighthouse Studio

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

8 days 15 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

-

SawtoothSoftware Lighthouse Studio is a sophisticated survey design platform widely used by businesses and researchers to collect and analyze complex survey data. Its intuitive user interface and powerful features allow users to create surveys ranging from simple questionnaires to intricate conjoint analysis studies. The software is deployed in a wide range of sectors, including market research, healthcare, and education, to gain insights that drive decision-making processes. Its ease of integration and extensive customization options make it a valuable tool for professionals seeking in-depth insights into customer and employee preferences. Lighthouse Studio by Sawtooth Software is highly regarded for its advanced analytics capabilities and powerful reporting tools, assisting users in data-driven decision-making.

This particular vulnerability, a Remote Code Execution (RCE), arises due to unsafe coding practices within the software's Perl CGI component, `ciwweb.pl`. The vulnerability stems from improper handling of user input, which is passed to the `eval` function without adequate sanitization. Attackers can exploit this flaw to execute arbitrary code on the server, thereby compromising the integrity and availability of the system. Such a vulnerability can be exploited pre-authentically, meaning attackers don't need prior access or credentials to target the system. The critical impact includes unauthorized access and potential data breaches, leading to significant security risks.

The technical details of the vulnerability involve the misuse of the `eval` function in Lighthouse Studio's CGI script, specifically in `ciwweb.pl`. The component `hid_Random_ACARAT` is the vulnerable endpoint that processes user input. Attackers can manipulate this input to inject malicious Perl code, which is subsequently executed by the server. This severe oversight in input validation allows remote attackers to gain control over server operations. Effectively, it showcases the dangers of using potentially unsafe functions like `eval` in web applications without stringent input validation.

If exploited by malicious actors, this vulnerability could result in unauthorized command execution, data theft, alteration or deletion, and potentially full control over the affected systems. Businesses relying on this software might face data integrity issues, financial losses, compliance violations, and reputational damage. Rapid exploitation could even facilitate further attacks, leveraging compromised systems to infiltrate wider networks.

REFERENCES

Get started to protecting your digital assets