CVE-2019-15931

9.8 CRITICAL

📋 TL;DR

CVE-2019-15931 is a directory traversal vulnerability in Intesync Solismed 3.3sp that allows attackers to access files outside the intended directory. This affects all organizations using Solismed 3.3sp without proper input validation. Attackers can potentially read sensitive system files through crafted HTTP requests.

💻 Affected Systems

Products:
  • Intesync Solismed
Versions: 3.3sp
Operating Systems: Any OS running Solismed
Default Config Vulnerable: ⚠️ Yes
Notes: This is a different vulnerability from CVE-2019-16246 in the same product.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading sensitive configuration files, credentials, or patient data, potentially leading to data breach and regulatory violations.

🟠

Likely Case

Unauthorized access to sensitive files containing configuration data, user credentials, or patient information.

🟢

If Mitigated

Limited impact with proper web application firewalls and input validation controls in place.

🌐 Internet-Facing: HIGH - Web applications exposed to internet are directly vulnerable to exploitation.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities are typically easy to exploit with simple HTTP requests containing path traversal sequences.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact vendor for patched version

Vendor Advisory: https://www.solismed.com/

Restart Required: Yes

Instructions:

1. Contact Intesync for patched version of Solismed 3.3sp. 2. Backup current installation. 3. Apply vendor-provided patch. 4. Restart Solismed services. 5. Verify fix is working.

🔧 Temporary Workarounds

Web Application Firewall Rules

all

Implement WAF rules to block directory traversal patterns in HTTP requests

# Example mod_security rule: SecRule ARGS "\.\./" "id:1001,phase:2,deny,msg:'Directory Traversal Attempt'

Input Validation Filter

all

Add input validation to filter out path traversal sequences before processing

# Example in application code: filter_input(INPUT_GET, 'file', FILTER_SANITIZE_STRING)

🧯 If You Can't Patch

  • Isolate Solismed system in separate network segment with strict access controls
  • Implement network-based intrusion detection to monitor for traversal attempts

🔍 How to Verify

Check if Vulnerable:

Test with HTTP requests containing traversal sequences like ../../etc/passwd to Solismed endpoints

Check Version:

Check Solismed version in web interface or configuration files

Verify Fix Applied:

Attempt same traversal requests and verify they are blocked or return error

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing ../ patterns
  • Access to unexpected file paths in web logs
  • Failed file access attempts outside web root

Network Indicators:

  • HTTP requests with encoded traversal sequences (%2e%2e%2f)
  • Multiple failed file access attempts

SIEM Query:

source="web_logs" AND ("../" OR "..\\" OR "%2e%2e%2f")

🔗 References

📤 Share & Export