CVE-2019-10765
📋 TL;DR
CVE-2019-10765 is a path traversal vulnerability in ioBroker.admin that allows attackers to read arbitrary files outside the intended /log/file1/ directory. This affects all systems running ioBroker.admin versions before 3.6.12. Attackers can exploit this to access sensitive system files and configuration data.
💻 Affected Systems
- ioBroker.admin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through reading sensitive files like SSH keys, passwords, or configuration files leading to privilege escalation and lateral movement.
Likely Case
Unauthorized access to sensitive configuration files, logs, or credentials stored on the server.
If Mitigated
Limited impact with proper network segmentation and file system permissions restricting access to critical files.
🎯 Exploit Status
Simple path traversal attack requiring minimal technical skill to execute.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.6.12 and later
Vendor Advisory: https://github.com/ioBroker/ioBroker.admin/commit/16b2b325ab47896090bc7f54b77b0a97ed74f5cd
Restart Required: Yes
Instructions:
1. Update ioBroker.admin to version 3.6.12 or later using npm: npm update iobroker.admin
2. Restart the ioBroker service
3. Verify the update completed successfully
🔧 Temporary Workarounds
Network Isolation
allRestrict network access to ioBroker.admin interface
Use firewall rules to block external access to ioBroker.admin port (default 8081)
File System Restrictions
linuxApply strict file permissions to limit accessible directories
chmod 700 /path/to/sensitive/directories
chown root:root /path/to/sensitive/files
🧯 If You Can't Patch
- Implement strict network segmentation to isolate ioBroker systems from untrusted networks
- Apply principle of least privilege to file system permissions and restrict ioBroker process access
🔍 How to Verify
Check if Vulnerable:
Check ioBroker.admin version: npm list iobroker.admin | grep iobroker.admin
Check Version:
npm list iobroker.admin | grep iobroker.admin
Verify Fix Applied:
Verify version is 3.6.12 or higher: npm list iobroker.admin | grep iobroker.admin
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in ioBroker logs
- Requests with ../ sequences in URL parameters
Network Indicators:
- HTTP requests containing path traversal sequences (../, ..\) to ioBroker.admin endpoints
SIEM Query:
source="ioBroker" AND (url="*../*" OR url="*..\\*")