CVE-2019-15936
📋 TL;DR
CVE-2019-15936 is an insecure file upload vulnerability in Intesync Solismed 3.3sp that allows attackers to upload malicious files without proper validation. This affects all users running the vulnerable version of the Solismed medical management software. Attackers can exploit this to upload webshells or other malicious payloads to the server.
💻 Affected Systems
- Intesync Solismed
📦 What is this software?
Solismed by Intesync
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to remote code execution, data theft, ransomware deployment, and lateral movement within the network.
Likely Case
Webshell upload leading to persistent backdoor access, data exfiltration, and potential pivot to other systems.
If Mitigated
Limited impact with proper file upload restrictions, web application firewalls, and network segmentation in place.
🎯 Exploit Status
Exploitation is straightforward - attackers simply need to craft a malicious file upload request to the vulnerable endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Later versions after 3.3sp
Vendor Advisory: https://know.bishopfox.com/advisories/solismed-critical
Restart Required: Yes
Instructions:
1. Contact Intesync for the latest patched version. 2. Backup current configuration and data. 3. Apply the patch or upgrade to a fixed version. 4. Restart the Solismed application service. 5. Verify the fix is working.
🔧 Temporary Workarounds
Web Application Firewall Rules
allImplement WAF rules to block malicious file uploads and suspicious file extensions.
File Upload Restrictions
allConfigure server-side validation to only allow specific file types and implement file size limits.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the Solismed server from critical systems
- Deploy intrusion detection systems to monitor for file upload anomalies and webshell activity
🔍 How to Verify
Check if Vulnerable:
Check if running Solismed version 3.3sp and test file upload functionality with various file types.
Check Version:
Check Solismed administration panel or configuration files for version information.
Verify Fix Applied:
Attempt to upload malicious files after patching - successful uploads should be blocked with proper validation.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to Solismed endpoints
- Uploads of executable files or scripts
- Multiple failed upload attempts
Network Indicators:
- HTTP POST requests to file upload endpoints with suspicious payloads
- Traffic to unexpected ports from the Solismed server
SIEM Query:
source="solismed_logs" AND (event="file_upload" AND (file_extension="php" OR file_extension="jsp" OR file_extension="asp"))