CVE-2017-15681

9.8 CRITICAL

📋 TL;DR

CVE-2017-15681 is a critical directory traversal vulnerability in Crafter CMS Crafter Studio 3.0.1 that allows unauthenticated attackers to overwrite arbitrary files on the operating system. This can lead to remote code execution (RCE) by modifying system files or application components. All systems running the affected version without proper access controls are vulnerable.

💻 Affected Systems

Products:
  • Crafter CMS Crafter Studio
Versions: 3.0.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration and requires no special settings to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution, allowing attackers to execute arbitrary commands, steal data, install malware, or pivot to other systems.

🟠

Likely Case

File system manipulation leading to web application compromise, data theft, or service disruption through file overwrites.

🟢

If Mitigated

Limited impact if proper network segmentation and file permission controls prevent traversal beyond web root directory.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities are well-understood and easily weaponized. The unauthenticated nature makes this particularly dangerous.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.2 and later

Vendor Advisory: https://docs.craftercms.org/en/3.0/security/advisory.html

Restart Required: Yes

Instructions:

1. Backup your current installation and data. 2. Download Crafter CMS version 3.0.2 or later from the official website. 3. Stop the Crafter Studio service. 4. Replace the installation with the patched version. 5. Restart the service. 6. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Crafter Studio administration interface to trusted IP addresses only.

# Configure firewall rules to restrict access to Crafter Studio port (default 8080)
# Example iptables: iptables -A INPUT -p tcp --dport 8080 -s TRUSTED_IP -j ACCEPT
# Example Windows Firewall: New-NetFirewallRule -DisplayName 'Crafter Studio Access' -Direction Inbound -LocalPort 8080 -Protocol TCP -RemoteAddress TRUSTED_IP -Action Allow

File System Permissions Hardening

linux

Set strict file permissions to prevent unauthorized file writes even if traversal is attempted.

# Set web root directory to read-only for web user
chmod -R 755 /path/to/crafter/webroot
# Ensure web user cannot write to system directories
chmod -R 750 /etc /usr /var

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Crafter Studio from critical systems and the internet.
  • Deploy a web application firewall (WAF) with directory traversal protection rules enabled.

🔍 How to Verify

Check if Vulnerable:

Check the Crafter Studio version in the administration interface or by examining the installation directory for version files. If version is exactly 3.0.1, the system is vulnerable.

Check Version:

Check the version.txt file in the Crafter Studio installation directory or use: cat /path/to/crafter/studio/version.txt

Verify Fix Applied:

After patching, verify the version shows 3.0.2 or later in the administration interface. Test directory traversal attempts should be blocked.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed attempts to access files with '../' patterns in URLs
  • Unauthorized file write operations in web server logs
  • Unusual file modification timestamps in web directories

Network Indicators:

  • HTTP requests containing '../' sequences targeting Crafter Studio endpoints
  • Unusual outbound connections from Crafter Studio server

SIEM Query:

source="web_server_logs" AND (url="*../*" OR url="*..\\*" OR status=200 AND method="PUT" AND url="*.jsp" OR url="*.sh")

🔗 References

📤 Share & Export