CVE-2019-12314

9.8 CRITICAL

📋 TL;DR

CVE-2019-12314 is a critical local file inclusion vulnerability in Deltek Maconomy ERP software that allows attackers to read arbitrary files on the server via path traversal. This affects Deltek Maconomy version 2.2.5 installations. Attackers can exploit this to access sensitive system files like /etc/passwd.

💻 Affected Systems

Products:
  • Deltek Maconomy
Versions: 2.2.5
Operating Systems: Any OS running Maconomy (typically Windows Server)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component of Maconomy ERP.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via reading sensitive configuration files, credentials, or executing arbitrary code through file inclusion of malicious scripts.

🟠

Likely Case

Information disclosure of sensitive files including configuration files, credentials, and system files leading to further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation, file permissions, and web application firewalls are in place.

🌐 Internet-Facing: HIGH - Directly exploitable via HTTP requests without authentication.
🏢 Internal Only: HIGH - Even internal attackers can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request with path traversal in URI can trigger the vulnerability. Multiple public exploit scripts exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.6 or later

Vendor Advisory: https://github.com/ras313/CVE-2019-12314/security/advisories/GHSA-8762-rf4g-23xm

Restart Required: Yes

Instructions:

1. Contact Deltek support for patch 2.2.6 or later. 2. Apply the patch following vendor instructions. 3. Restart the Maconomy application server. 4. Verify the fix by testing the vulnerable endpoint.

🔧 Temporary Workarounds

Web Application Firewall Rule

all

Block requests containing path traversal patterns in the URI

WAF-specific configuration to block patterns like '../', '/etc/passwd', 'WS.macx1.W_MCS' in PATH_INFO

File Permission Restriction

linux/windows

Restrict web server user permissions to limit file access

chmod 750 /etc/passwd (Linux)
icacls C:\Windows\System32\config /deny IIS_IUSRS:(R) (Windows)

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Maconomy servers from internet and untrusted networks.
  • Deploy a web application firewall (WAF) with rules to block path traversal patterns and monitor for exploitation attempts.

🔍 How to Verify

Check if Vulnerable:

Send HTTP GET request to: http://[target]/cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd and check if /etc/passwd contents are returned.

Check Version:

Check Maconomy version in application interface or consult Deltek documentation for version checking.

Verify Fix Applied:

Attempt the same exploit request after patching - should return error or no file contents.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing 'WS.macx1.W_MCS' followed by path traversal patterns
  • Access to sensitive file paths in web server logs
  • Unusual file read operations from web process

Network Indicators:

  • HTTP GET requests with '/etc/passwd', '/etc/shadow', or Windows equivalent paths in URI
  • Traffic to vulnerable endpoint with abnormal file paths

SIEM Query:

source="web_server_logs" AND (uri="*WS.macx1.W_MCS*" AND (uri="*../*" OR uri="*/etc/passwd*" OR uri="*C:\\Windows\\*"))

🔗 References

📤 Share & Export