Borg SPM 2007 Arbitrary File Upload Vulnerability (CVE-2026-6885)
An unauthenticated remote attacker can exploit an arbitrary file upload vulnerability (CVE-2026-6885) in Borg SPM 2007 to upload and execute web shell backdoors, leading to arbitrary code execution on the server.
Borg SPM 2007, a product by BorG Technology Corporation with sales ending in 2008, is vulnerable to arbitrary file uploads (CVE-2026-6885). This vulnerability allows unauthenticated remote attackers to upload malicious files, such as web shells, which can then be executed by the server. The attacker can then achieve arbitrary code execution, leading to a compromise of the system. Given the age of the software, it is likely running on outdated systems with fewer security controls making successful exploitation highly probable. This poses a significant risk to organizations still using this software.
Attack Chain
- The attacker identifies a Borg SPM 2007 server exposed to the internet.
- The attacker sends a crafted HTTP POST request to the server, exploiting the file upload vulnerability (CVE-2026-6885).
- The POST request contains a malicious file, such as a PHP web shell, disguised with a permissible extension or without any extension check.
- The Borg SPM 2007 server saves the uploaded file to a publicly accessible directory, without proper sanitization.
- The attacker sends another HTTP request to access the uploaded web shell.
- The web server executes the web shell code, granting the attacker arbitrary code execution on the server.
- The attacker uses the web shell to gain a persistent foothold, install malware, or exfiltrate sensitive data.
Impact
Successful exploitation of this vulnerability allows an unauthenticated remote attacker to execute arbitrary code on the vulnerable server. This can lead to full system compromise, data theft, and potential disruption of services. While the number of active installations is likely low due to the product’s end-of-life status in 2008, organizations still running Borg SPM 2007 are at high risk if the system is exposed to the Internet.
Recommendation
- Identify instances of Borg SPM 2007 running in your environment and isolate them from the network if possible.
- Implement the provided Sigma rule to detect potential web shell uploads based on HTTP request characteristics.
- Since no patch exists, consider immediate decommissioning or migration to a supported alternative.
Detection coverage 2
Detect Web Shell Upload via HTTP POST
highDetects potential web shell uploads by monitoring HTTP POST requests with common web shell file extensions.
Detect Access to Newly Uploaded Web Shell
highDetects access to recently uploaded files with web shell extensions, indicating potential exploitation of a file upload vulnerability.
Detection queries are kept inside the platform. Get full rules →