CVE-2019-1010308
📋 TL;DR
Aquarius CMS versions prior to 4.1.1 have an incorrect access control vulnerability where log files containing sensitive information like passwords are accessible without authentication. Attackers can directly access these files to steal credentials and other sensitive data. All deployments using affected versions are vulnerable.
💻 Affected Systems
- Aquaverde GmbH Aquarius CMS
📦 What is this software?
Aquarius Cms by Aquaverde
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise through credential theft, privilege escalation, and data exfiltration from exposed passwords and sensitive information in logs.
Likely Case
Unauthorized access to sensitive log data leading to credential harvesting, session hijacking, and potential lateral movement within the system.
If Mitigated
Minimal impact with proper access controls and log sanitization in place, limiting exposure to non-sensitive information.
🎯 Exploit Status
Exploitation requires direct file access to log files, which is trivial for attackers with network access to the system.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.1.1
Vendor Advisory: https://github.com/aquaverde/aquarius-core/commit/e1af89aa9df07ea265d879518ede9eb98aa494e0
Restart Required: Yes
Instructions:
1. Backup current installation and database. 2. Download Aquarius CMS version 4.1.1 or later from official repository. 3. Replace existing files with patched version. 4. Restart web server and application services. 5. Verify log file permissions are properly restricted.
🔧 Temporary Workarounds
Restrict log file access permissions
linuxManually set restrictive file permissions on log directories and files to prevent unauthorized access.
chmod 600 /path/to/aquarius/logs/*
chown root:root /path/to/aquarius/logs/
Move logs outside web root
allRelocate log files to a directory not accessible via web server.
mv /var/www/aquarius/logs /var/log/aquarius/
Update Aquarius configuration to use new log path
🧯 If You Can't Patch
- Implement strict network access controls to limit who can reach the Aquarius CMS instance.
- Configure web server (Apache/Nginx) to deny access to log file directories using .htaccess or server configuration rules.
🔍 How to Verify
Check if Vulnerable:
Check if log files at /aquarius/logs/ are accessible via HTTP request or direct file access without authentication.
Check Version:
Check Aquarius CMS admin panel or read version.txt file in installation directory.
Verify Fix Applied:
Attempt to access log files via HTTP and direct file access after patching - both should return access denied errors.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to log file paths
- Failed authentication attempts followed by log file access
Network Indicators:
- HTTP requests to /aquarius/logs/* paths from unauthorized IPs
- Unusual outbound traffic containing log data
SIEM Query:
source="web_server" AND (url_path="/aquarius/logs/" OR url_path CONTAINS ".log") AND response_code=200